메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 123-139

Beyond proof-of-compliance: Safety and availability analysis in trust management

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMPUTATIONAL LINGUISTICS; POLYNOMIAL APPROXIMATION;

EID: 33744503327     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2003.1199332     Document Type: Conference Paper
Times cited : (17)

References (21)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • Martín Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 5
    • 0021509216 scopus 로고
    • Linear-time algorithms for testing the satisfiability of propositional horn formulae
    • William F. Dowling and Jean H. Gallier. Linear-time algorithms for testing the satisfiability of propositional horn formulae. Journal of Logic Programming, 1(3):267-284, 1984.
    • (1984) Journal of Logic Programming , vol.1 , Issue.3 , pp. 267-284
    • Dowling, W.F.1    Gallier, J.H.2
  • 10
    • 77955202238 scopus 로고    scopus 로고
    • Analysis of SPKI/SDSI certificates using model checking
    • IEEE Computer Society Press, June
    • Somesh Jha and Thomas Reps. Analysis of SPKI/SDSI certificates using model checking. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 129-144. IEEE Computer Society Press, June 2002.
    • (2002) Proceedings of the 15th IEEE Computer Security Foundations Workshop , pp. 129-144
    • Jha, S.1    Reps, T.2
  • 12
    • 3142654848 scopus 로고
    • Jan
    • Reprinted in ACM Operating Systems Review, 8(1):18-24, Jan 1974.
    • (1974) ACM Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 17
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • February
    • Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 18
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • Richard J. Lipton and Lawrence Snyder. A linear time algorithm for deciding subject security. Journal of ACM, 24(3):455-464, 1977.
    • (1977) Journal of ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 20
    • 0023999796 scopus 로고
    • The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems
    • Ravi S. Sandhu. The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems. Journal of ACM, 35(2):404-432, 1988.
    • (1988) Journal of ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.