메뉴 건너뛰기




Volumn 4189 LNCS, Issue , 2006, Pages 156-173

Reducing the dependence of SPKI/SDSI on PKI

Author keywords

[No Author keywords available]

Indexed keywords

COPYRIGHTS; DECENTRALIZED CONTROL; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION MANAGEMENT; INFORMATION RETRIEVAL SYSTEMS; PROBLEM SOLVING;

EID: 33750252806     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11863908_11     Document Type: Conference Paper
Times cited : (5)

References (23)
  • 2
    • 0003226048 scopus 로고    scopus 로고
    • The KeyNote trust-management system version 2
    • Sept.
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote trust-management system version 2. RFC 2704, Sept. 1999.
    • (1999) RFC , vol.2704
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 5
    • 0026944928 scopus 로고
    • On the regular structure of prefix rewriting
    • D. Caucal. On the regular structure of prefix rewriting. Theoretical Computer Science, 106(1):61-86, 1992.
    • (1992) Theoretical Computer Science , vol.106 , Issue.1 , pp. 61-86
    • Caucal, D.1
  • 6
    • 84888846504 scopus 로고    scopus 로고
    • CITI: Projects. Kerberos leveraged PKI. http://www.citi.umich.edu/ projects/kerb.pki/.
    • Kerberos Leveraged PKI
  • 11
    • 0003623954 scopus 로고    scopus 로고
    • A formal semantics for SPKI
    • Department of Computer Science, Dartmouth College, Hanover, NH, Mar.
    • J. Howell and D. Kotz. A formal semantics for SPKI. Technical Report 2000-363, Department of Computer Science, Dartmouth College, Hanover, NH, Mar. 2000.
    • (2000) Technical Report , vol.2000 , Issue.363
    • Howell, J.1    Kotz, D.2
  • 12
    • 0003735746 scopus 로고    scopus 로고
    • Public key cryptography for cross-realm authentication in Kerberos
    • Nov., draft-ieft-cat-kerberos-pk-cross-08.txt
    • M. Hur, B. Tung, T. Ryutov, C. Neuman, A. Medvinsky, G. Tsudik, and B. Sommerfeld. Public key cryptography for cross-realm authentication in Kerberos, Nov. 2001. Internet-Draft, draft-ieft-cat-kerberos-pk-cross-08.txt.
    • (2001) Internet-draft
    • Hur, M.1    Tung, B.2    Ryutov, T.3    Neuman, C.4    Medvinsky, A.5    Tsudik, G.6    Sommerfeld, B.7
  • 13
    • 3042565619 scopus 로고    scopus 로고
    • Model checking SPKI/SDSI
    • S. Jha and T. Reps. Model checking SPKI/SDSI. Journal of Computer Security, 12(3-4):317-353, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.3-4 , pp. 317-353
    • Jha, S.1    Reps, T.2
  • 14
    • 84888820903 scopus 로고    scopus 로고
    • Weighted pushdown systems and trust-management systems
    • S. Jha, S. Schwoon, H. Wang, and T. Reps. Weighted pushdown systems and trust-management systems. In TACAS, 2006.
    • (2006) TACAS
    • Jha, S.1    Schwoon, S.2    Wang, H.3    Reps, T.4
  • 18
    • 0027316628 scopus 로고
    • Proxy-based authorization and accounting for distributed systems
    • B. C. Neuman. Proxy-based authorization and accounting for distributed systems. In ICDCS, pages 283-291, 1993.
    • (1993) ICDCS , pp. 283-291
    • Neuman, B.C.1
  • 19
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, September 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.