-
3
-
-
84982899264
-
The role of trust management in distributed systems security
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pages 185-210, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
5
-
-
0026944928
-
On the regular structure of prefix rewriting
-
D. Caucal. On the regular structure of prefix rewriting. Theoretical Computer Science, 106(1):61-86, 1992.
-
(1992)
Theoretical Computer Science
, vol.106
, Issue.1
, pp. 61-86
-
-
Caucal, D.1
-
6
-
-
84888846504
-
-
CITI: Projects. Kerberos leveraged PKI. http://www.citi.umich.edu/ projects/kerb.pki/.
-
Kerberos Leveraged PKI
-
-
-
7
-
-
0035680371
-
Certficate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. M. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certficate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(1/2):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.M.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
9
-
-
0003618065
-
-
The Internet Society, September
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. RFC 2693: SPKI Certificate Theory. The Internet Society, September 1999.
-
(1999)
RFC 2693: SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylönen, T.6
-
11
-
-
0003623954
-
A formal semantics for SPKI
-
Department of Computer Science, Dartmouth College, Hanover, NH, Mar.
-
J. Howell and D. Kotz. A formal semantics for SPKI. Technical Report 2000-363, Department of Computer Science, Dartmouth College, Hanover, NH, Mar. 2000.
-
(2000)
Technical Report
, vol.2000
, Issue.363
-
-
Howell, J.1
Kotz, D.2
-
12
-
-
0003735746
-
Public key cryptography for cross-realm authentication in Kerberos
-
Nov., draft-ieft-cat-kerberos-pk-cross-08.txt
-
M. Hur, B. Tung, T. Ryutov, C. Neuman, A. Medvinsky, G. Tsudik, and B. Sommerfeld. Public key cryptography for cross-realm authentication in Kerberos, Nov. 2001. Internet-Draft, draft-ieft-cat-kerberos-pk-cross-08.txt.
-
(2001)
Internet-draft
-
-
Hur, M.1
Tung, B.2
Ryutov, T.3
Neuman, C.4
Medvinsky, A.5
Tsudik, G.6
Sommerfeld, B.7
-
14
-
-
84888820903
-
Weighted pushdown systems and trust-management systems
-
S. Jha, S. Schwoon, H. Wang, and T. Reps. Weighted pushdown systems and trust-management systems. In TACAS, 2006.
-
(2006)
TACAS
-
-
Jha, S.1
Schwoon, S.2
Wang, H.3
Reps, T.4
-
15
-
-
85084164300
-
Kerberized credential translation: A solution to web access control
-
O. Kornievskaia, P. Honeyman, B. Doster, and K. Coffman. Kerberized credential translation: A solution to web access control. In 10th USENIX Security Symposium, pages 235-250, 2001.
-
(2001)
10th USENIX Security Symposium
, pp. 235-250
-
-
Kornievskaia, O.1
Honeyman, P.2
Doster, B.3
Coffman, K.4
-
16
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
18
-
-
0027316628
-
Proxy-based authorization and accounting for distributed systems
-
B. C. Neuman. Proxy-based authorization and accounting for distributed systems. In ICDCS, pages 283-291, 1993.
-
(1993)
ICDCS
, pp. 283-291
-
-
Neuman, B.C.1
-
19
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
20
-
-
84942241879
-
On generalized authorization problems
-
IEEE Computer Society, June
-
S. Schwoon, S. Jha, T. Reps, and S. Stubblebine. On generalized authorization problems. In Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW), pages 202-218. IEEE Computer Society, June 2003.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 202-218
-
-
Schwoon, S.1
Jha, S.2
Reps, T.3
Stubblebine, S.4
-
23
-
-
33750278459
-
Public key cryptography for initial authentication in Kerberos
-
draft-ieft-cat-kerberos-pk-init-17.txt
-
B. Tung, C. Neuman, M. Hur, A. Medivinsky, S. Medvinsky, J. Wray, and J. Trostle. Public key cryptography for initial authentication in Kerberos, 2004. Internet-Draft, draft-ieft-cat-kerberos-pk-init-17.txt.
-
(2004)
Internet-draft
-
-
Tung, B.1
Neuman, C.2
Hur, M.3
Medivinsky, A.4
Medvinsky, S.5
Wray, J.6
Trostle, J.7
|