-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
4
-
-
84982899264
-
The role of trust management in distributed systems security
-
Vitek and Jensen, editors, LNCS 1603
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The role of trust management in distributed systems security. In Vitek and Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pages 185-210, 1999. LNCS 1603.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
5
-
-
0003226048
-
The KeyNote trust-management system version 2
-
Sept.
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, The KeyNote Trust-Management System Version 2, RFC 2704, Sept. 1999.
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
6
-
-
84944409047
-
Reachability analysis of pushdown automata: Application to model-checking
-
Proceedings of CONCUR'97. Springer
-
A. Bouajjani, J. Esparza, and O. Maler. Reachability analysis of pushdown automata: Application to model-checking. In Proceedings of CONCUR'97, volume 1243 of Lecture Notes in Computer Science, pages 135-150. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1243
, pp. 135-150
-
-
Bouajjani, A.1
Esparza, J.2
Maler, O.3
-
7
-
-
1442308204
-
A generic approach to the static analysis of concurrent programs with procedures
-
A. Bouajjani, J. Esparza, and T. Touili. A generic approach to the static analysis of concurrent programs with procedures. In Proceedings of POPL'03, 2003.
-
(2003)
Proceedings of POPL'03
-
-
Bouajjani, A.1
Esparza, J.2
Touili, T.3
-
8
-
-
0035680371
-
Certficate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. M. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certficate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(1/2):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.M.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
9
-
-
0003618065
-
-
The Internet Society, September
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. RFC 2693: SPKI Certificate Theory. The Internet Society, September 1999.
-
(1999)
RFC 2693: SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylönen, T.6
-
10
-
-
84944409009
-
Efficient algorithms for model checking pushdown systems
-
E. A. Emerson and A. P. Sistla, editors, Proceedings of CAV'2000. Springer, July
-
J. Esparza, D. Hansel, P. Rossmanith, and S. Schwoon. Efficient algorithms for model checking pushdown systems. In E. A. Emerson and A. P. Sistla, editors, Proceedings of CAV'2000, volume 1855 of Lecture Notes in Computer Science, pages 232-247. Springer, July 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1855
, pp. 232-247
-
-
Esparza, J.1
Hansel, D.2
Rossmanith, P.3
Schwoon, S.4
-
13
-
-
0003623954
-
A formal semantics for SPKI
-
Department of Computer Science, Dartmouth College, Hanover, NH, Mar.
-
J. Howell and D. Kotz. A formal semantics for SPKI. Technical Report 2000-363, Department of Computer Science, Dartmouth College, Hanover, NH, Mar. 2000.
-
(2000)
Technical Report
, vol.2000
, Issue.363
-
-
Howell, J.1
Kotz, D.2
-
18
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
20
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
February
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
21
-
-
35448990873
-
System description: Twelf - A meta-logical framework for deductive systems
-
H. Ganzinger, editor. Springer-Verlag, LNAI 1632, July
-
F. Pfenning and C. Schürmann. System description: Twelf - a meta-logical framework for deductive systems. In H. Ganzinger, editor, Int. Conf. on Auto. Deduc., pages 202-206. Springer-Verlag, LNAI 1632, July 1999.
-
(1999)
Int. Conf. on Auto. Deduc.
, pp. 202-206
-
-
Pfenning, F.1
Schürmann, C.2
-
22
-
-
1442332459
-
Weighted pushdown systems and their application to interprocedural dataflow analysis
-
San Diego, CA, June 11-13
-
T. Reps, S. Schwoon, and S. Jha. Weighted pushdown systems and their application to interprocedural dataflow analysis. In Proceedings of the 10th Internation Static Analysis Symposium (SAS), San Diego, CA, June 11-13 2003.
-
(2003)
Proceedings of the 10th Internation Static Analysis Symposium (SAS)
-
-
Reps, T.1
Schwoon, S.2
Jha, S.3
-
23
-
-
24344477041
-
Weighted pushdown systems and their application to interprocedural dataflow analysis
-
October
-
T. Reps, S. Schwoon, S. Jha, and D. Melski. Weighted pushdown systems and their application to interprocedural dataflow analysis. Science of Computer Programming, 58(1-2):206-263, October 2005.
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 206-263
-
-
Reps, T.1
Schwoon, S.2
Jha, S.3
Melski, D.4
-
24
-
-
84942241879
-
On generalized authorization problems
-
IEEE Computer Society, June
-
S. Schwoon, S. Jha, T. Reps, and S. Stubblebine. On generalized authorization problems. In Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW), pages 202-218. IEEE Computer Society, June 2003.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 202-218
-
-
Schwoon, S.1
Jha, S.2
Reps, T.3
Stubblebine, S.4
-
25
-
-
0034835799
-
Understanding trust management systems
-
Research in Security and Privacy, Oakland, CA, May. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
S. Weeks. Understanding trust management systems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, Oakland, CA, May 2001. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(2001)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Weeks, S.1
|