-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
Martín Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0004078695
-
-
version 2. IETF RFC 2704, September
-
Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote trustmanagement system, version 2. IETF RFC 2704, September 1999.
-
(1999)
The KeyNote Trustmanagement System
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
4
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
5
-
-
0021509216
-
Linear-time algorithms for testing the satisfiability of propositional horn formulae
-
William F. Dowling and Jean H. Gallier. Linear-time algorithms for testing the satisfiability of propositional horn formulae. Journal of Logic Programming, 1(3):267-284, 1984.
-
(1984)
Journal of Logic Programming
, vol.1
, Issue.3
, pp. 267-284
-
-
Dowling, W.F.1
Gallier, J.H.2
-
6
-
-
0003593599
-
-
IETF RFC 2693, September
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylonen. SPKI certificate theory. IETF RFC 2693, September 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
0016984825
-
Protection in operating systems
-
August
-
Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
10
-
-
77955202238
-
Analysis of SPKI/SDSI certificates using model checking
-
IEEE Computer Society Press, June
-
Somesh Jha and Thomas Reps. Analysis of SPKI/SDSI certificates using model checking. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 129-144. IEEE Computer Society Press, June 2002.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 129-144
-
-
Jha, S.1
Reps, T.2
-
12
-
-
3142654848
-
-
Jan
-
Reprinted in ACM Operating Systems Review, 8(1):18-24, Jan 1974.
-
(1974)
ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
17
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
February
-
Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
18
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
Richard J. Lipton and Lawrence Snyder. A linear time algorithm for deciding subject security. Journal of ACM, 24(3):455-464, 1977.
-
(1977)
Journal of ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
20
-
-
0023999796
-
The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems
-
Ravi S. Sandhu. The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems. Journal of ACM, 35(2):404-432, 1988.
-
(1988)
Journal of ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
|