-
1
-
-
4243503866
-
-
Tech. Rep. TISR #07452-2, TIS Labs at Network Associates, Inc. February
-
BALENSON, D., BRANSTAD, D., DINSMORE, P., HEYMAN, M., AND SCACE, C. 1999. Cryptographic Context Negotiation Template. Tech. Rep. TISR #07452-2, TIS Labs at Network Associates, Inc. February.
-
(1999)
Cryptographic Context Negotiation Template
-
-
Balenson, D.1
Branstad, D.2
Dinsmore, P.3
Heyman, M.4
Scace, C.5
-
2
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
BARTAL, Y., MAYER, A. J., NISSIM, K., AND WOOL, A. 1999. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy. 17-31.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.J.2
Nissim, K.3
Wool, A.4
-
3
-
-
0005908365
-
Distributed firewalls
-
November USENIX
-
BELLOVIN, S. November 1999. Distributed Firewalls. USENIX; Login:, 39-47.
-
(1999)
Login
, pp. 39-47
-
-
Bellovin, S.1
-
4
-
-
0032203011
-
Coyote: A system for constructing fine-grain configurable communication services
-
BHATTI, N. T., HILTUNEN, M. A., SCHLICHTING, R. D., AND CHIU, W. 1998. Coyote: A system for constructing fine-grain configurable communication services. ACM Transactions on Computer Systems 16, 4 (Nov.), 321-366.
-
(1998)
ACM Transactions on Computer Systems
, vol.16
, Issue.4 NOV
, pp. 321-366
-
-
Bhatti, N.T.1
Hiltunen, M.A.2
Schlichting, R.D.3
Chiu, W.4
-
6
-
-
84982899264
-
The role of trust management in distributed systems security
-
State-of-the-Art series, Springer-Verlag, New York, NY
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. 1999a. The role of trust management in distributed systems security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems. Lecture Notes in Computer Science, vol. 1603. State-of-the-Art series, Springer-Verlag, New York, NY. 184-210.
-
(1999)
Secure Internet Programming: Issues in Distributed and Mobile Object Systems Lecture Notes in Computer Science
, vol.1603
, pp. 184-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
7
-
-
0004078695
-
The keyNote trust management system-Version 2
-
RFC 2704
-
BLAZE, M., FEIGNBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. 1999b. The keyNote trust management system-Version 2. Internet Engineering Task Force. RFC 2704.
-
(1999)
Internet Engineering Task Force
-
-
Blaze, M.1
Feignbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
11
-
-
0005909175
-
REFEREE: Trust management for web applications
-
Anguilla, British West Indies
-
CHU, Y., FEIGENBAUM, J., LAMACCHIA, B., RESNICK, P., AND STRAUSS, M. 1998. REFEREE: trust management for web applications. In Proceedings of Financial Cryptography '98. vol. 1465. Anguilla, British West Indies. 254-274.
-
(1998)
Proceedings of Financial Cryptography '98
, vol.1465
, pp. 254-274
-
-
Chu, Y.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
14
-
-
84961696448
-
Policy-based security management for large dynamic groups: A overview of the DCCM project
-
DARPA, Hilton Head, SC
-
DINSMORE, P., BALENSON, D., HEYMAN, M., KRUUS, P., SCACE, C., AND SHERMAN, A. 2000. Policy-based security management for large dynamic groups: A overview of the DCCM project. In. Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX '00). DARPA, Hilton Head, SC. 64-73.
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX '00)
, pp. 64-73
-
-
Dinsmore, P.1
Balenson, D.2
Heyman, M.3
Kruus, P.4
Scace, C.5
Sherman, A.6
-
15
-
-
0003755277
-
The COPS (Common Open Policy Service) protocol
-
RFC 2748
-
DURHAM, D., BOYLE, J., COHEN, R., HERZOG, S., RAJAN, R., AND SASTRY, A. 2000. RFC 2748, The COPS (Common Open Policy Service) Protocol. Internet Engineering Task Force.
-
(2000)
Internet Engineering Task Force
-
-
Durham, D.1
Boyle, J.2
Cohen, R.3
Herzog, S.4
Rajan, R.5
Sastry, A.6
-
16
-
-
0003603813
-
-
Freeman, San Francisco, CA
-
GAREY, M. R. AND JOHNSON, D. S. 1979. Computers and intractibility, A guide to the theory of NP-completeness, 1st ed. Freeman, San Francisco, CA.
-
(1979)
Computers and Intractibility, A Guide to the Theory of NP-completeness, 1st Ed.
-
-
Garey, M.R.1
Johnson, D.S.2
-
19
-
-
0032182406
-
Configuration management for highly-customizable software
-
HILTUNEN, M. 1998. Configuration management for highly-customizable software. IEE Proceedings: Software 145, 5, 180-188.
-
(1998)
IEE Proceedings: Software
, vol.145
, Issue.5
, pp. 180-188
-
-
Hiltunen, M.1
-
20
-
-
33750909550
-
-
Tech. Rep. TROO-05, Department of Computer Science, University of Arizona. June
-
HILTUNEN, M., JAIPRAKASH, S., SCHLICHTING, R., AND UGARTE, C. 2000. Fine-grain configurability for secure communication. Tech. Rep. TROO-05, Department of Computer Science, University of Arizona. June.
-
(2000)
Fine-grain Configurability for Secure Communication
-
-
Hiltunen, M.1
Jaiprakash, S.2
Schlichting, R.3
Ugarte, C.4
-
21
-
-
0003900673
-
Internet X.509 public key infrastructure certificate and CRL profile
-
RFC 1949
-
HOUSLEY, R., FORD, W., POLK, W., AND SOLO, D. 1999. Internet X.509 public key infrastructure certificate and CRL profile. Internet Engineering Task Force. RFC 1949.
-
(1999)
Internet Engineering Task Force
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
22
-
-
0025722247
-
The x-kernel: An architecture for implementing network protocols
-
HUTCHINSON, N. AND PETERSON, L. 1994. The x-kernel: An architecture for implementing network protocols. IEEE Transactions on Software Engineering 17, 1 (Jan.), 64-76.
-
(1994)
IEEE Transactions on Software Engineering
, vol.17
, Issue.1 JAN
, pp. 64-76
-
-
Hutchinson, N.1
Peterson, L.2
-
23
-
-
0030677524
-
A logical language for expressing authorizations
-
IEEE, Oakland, CA
-
JAJODIA, S., SAMARATI, P., AND SUBRAHMANIAN, V. 1997. A logical language for expressing authorizations. In Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE, Oakland, CA. 31-42.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
-
24
-
-
0348037975
-
The computational complexity of graph algorithms with succinct representations
-
KARPINSKI, M. AND WAGNER, K. W. 1988. The computational complexity of graph algorithms with succinct representations. Z. Operations Res. 3, 32, 201-211.
-
(1988)
Z. Operations Res.
, vol.3
, Issue.32
, pp. 201-211
-
-
Karpinski, M.1
Wagner, K.W.2
-
26
-
-
0005986692
-
Secret-key agreement without public-key cryptography
-
LEIGHTON, T. AND MICALI, S. 1994. Secret-key agreement without public-key cryptography. In Proceedings of Crypto 93, 456-479.
-
(1994)
Proceedings of Crypto
, vol.93
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
27
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
LI, N., MITCHELL, J. C. AND WINSBOROUGH, W. H. 2005. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52, 3, 474-514.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
28
-
-
0042352269
-
Building reliable high-performance communication systems from components
-
ACM, New York.
-
LIU, X., KREITZ, C., VAN RENESSE, R., HICKEY, J., HAYDEN, M., BIRMAN, K., AND CONSTABLE, R. 1999. Building reliable high-performance communication systems from components. In Proceedings of 17th ACM Symposium on Operating Systems Principles (SOSP '99). vol. 33. ACM, New York. 80-92.
-
(1999)
Proceedings of 17th ACM Symposium on Operating Systems Principles (SOSP '99)
, vol.33
, pp. 80-92
-
-
Liu, X.1
Kreitz, C.2
Van Renesse, R.3
Hickey, J.4
Hayden, M.5
Birman, K.6
Constable, R.7
-
30
-
-
33750929443
-
-
Tech. Rep. TD-5JCJCK, AT&T Labs-Research, Florham Park, NJ. January
-
MCDANIEL, P. 2003. On context in authorization policy. Tech. Rep. TD-5JCJCK, AT&T Labs-Research, Florham Park, NJ. January.
-
(2003)
On Context in Authorization Policy
-
-
Mcdaniel, P.1
-
31
-
-
33750905951
-
-
Tech. Rep. TD-5C6JFV, AT&T Labs-Research, Florham Park, NJ. July
-
MCDANIEL, P. AND PRAKASH, A. 2002. An architecture for security policy enforcement. Tech. Rep. TD-5C6JFV, AT&T Labs-Research, Florham Park, NJ. July.
-
(2002)
An Architecture for Security Policy Enforcement
-
-
Mcdaniel, P.1
Prakash, A.2
-
32
-
-
33750916077
-
Security policy enforcement in the antigone system
-
Accepted for publication
-
MCDANIEL, P. AND PRAKASH, A. 2005. Security policy enforcement in the antigone system. Journal of Computer Security, Accepted for publication.
-
(2005)
Journal of Computer Security
-
-
Mcdaniel, P.1
Prakash, A.2
-
33
-
-
85084161955
-
Antigone: A flexible framework for secure group communication
-
Washington, DC
-
MCDANIEL, P., PRAKASH, A., AND HONEYMAN, P. 1999. Antigone: A flexible framework for secure group communication. In. Proceedings of the 8th USENIX Security Symposium. Washington, DC. 99-114.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 99-114
-
-
Mcdaniel, P.1
Prakash, A.2
Honeyman, P.3
-
34
-
-
84964476016
-
Flexibly constructing secure groups in Antigone 2.0
-
IEEE Computer Society Press, Los Angeles, CA
-
MCDANIEL, P., PRAKASH, A., IRRER, J., MITTAL, S., AND THUANG, T.-C. 2001. Flexibly constructing secure groups in Antigone 2.0. In Proceedings of DARPA Information Survivability Conference and Exposition II. IEEE Computer Society Press, Los Angeles, CA. 55-67.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition II
, pp. 55-67
-
-
Mcdaniel, P.1
Prakash, A.2
Irrer, J.3
Mittal, S.4
Thuang, T.-C.5
-
36
-
-
0030643872
-
Secure software architectures
-
MORICONI, M., QIAN, X., RIEMENSCHNEIDER, R. A., AND GONG, L. 1997. Secure software architectures. In Proceedings of the 1997 IEEE Symposium on Security and Privacy. 84-93.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 84-93
-
-
Moriconi, M.1
Qian, X.2
Riemenschneider, R.A.3
Gong, L.4
-
37
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
NEUMAN, B. C. AND TS'O, T. 1994. Kerberos: An authentication service for computer networks. IEEE Communications 32, 9 (Sept.), 33-38.
-
(1994)
IEEE Communications
, vol.32
, Issue.9 SEPT
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
38
-
-
85084162956
-
A java beans component architecture for cryptographic protocols
-
USENIX Association, San Antonio, Texas
-
NIKANDER, P. AND KARILA, A. 1998. A java beans component architecture for cryptographic protocols. In Proceedings of 7th USENIX UNIX Security Symposium. USENIX Association, San Antonio, Texas. 107-121.
-
(1998)
Proceedings of 7th USENIX UNIX Security Symposium
, pp. 107-121
-
-
Nikander, P.1
Karila, A.2
-
39
-
-
0003336080
-
Paving the road to network security or the value of small cobblestones
-
ORMAN, H., O'MALLEY, S., SCHROEPPEL, R., AND SCHWARTZ, D. 1994. Paving the road to network security or the value of small cobblestones. In Proceedings of the 1994 Internet Society Symposium on Network and Distributed System Security.
-
(1994)
Proceedings of the 1994 Internet Society Symposium on Network and Distributed System Security
-
-
Orman, H.1
O'Malley, S.2
Schroeppel, R.3
Schwartz, D.4
-
42
-
-
0027608186
-
Adaptive: A dynamically assembled protocol transformation, integration, and evaluation environment
-
SCHMIDT, D., FOX, D., AND SUDYA, T. 1993. Adaptive: A dynamically assembled protocol transformation, integration, and evaluation environment. Journal of Concurrency: Practice and Experience 5, 4 (June), 269-286.
-
(1993)
Journal of Concurrency: Practice and Experience
, vol.5
, Issue.4 JUNE
, pp. 269-286
-
-
Schmidt, D.1
Fox, D.2
Sudya, T.3
-
44
-
-
11244319622
-
Security policy reconciliation in distributed computing environments
-
IEEE Computer Society Press, New York
-
WANG, H., JHA, S., MCUANIEL, P., AND LIVNY, M. 2004. Security policy reconciliation in distributed computing environments. In Proceedings of 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004). IEEE Computer Society Press, New York 137-146.
-
(2004)
Proceedings of 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004)
, pp. 137-146
-
-
Wang, H.1
Jha, S.2
Mcuaniel, P.3
Livny, M.4
-
45
-
-
84974750564
-
Authorization in distributed systems; A new approach
-
Woo, T. AND LAM, S. 1993. Authorization in distributed systems; A new approach. Journal of Computer Security 2, 2-3, 107-136.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.1
Lam, S.2
-
46
-
-
0031704255
-
Designing a distributed authorization service
-
IEEE, San Francisco, CA
-
Woo, T. AND LAM, S. 1998. Designing a distributed authorization service. In Proceedings of INFOCOM '98. IEEE, San Francisco, CA.
-
(1998)
Proceedings of INFOCOM '98
-
-
Woo, T.1
Lam, S.2
-
47
-
-
0005946920
-
Domain based internet security policy management
-
DARPA, Hilton Head, SC
-
ZAO, J., SANCHEZ, L., CONDELL, M., LYNN, C., FEEDETTE, M., HELINEK, P., KRISHNAN, P., JACKSON, A., MANKINS, D., SHEPARD, M., AND KENT, S. 2000. Domain based internet security policy management. In Proceedings of DARPA Information Survuvability Conference and Exposition, DARPA, Hilton Head, SC. 41-53.
-
(2000)
Proceedings of DARPA Information Survuvability Conference and Exposition
, pp. 41-53
-
-
Zao, J.1
Sanchez, L.2
Condell, M.3
Lynn, C.4
Feedette, M.5
Helinek, P.6
Krishnan, P.7
Jackson, A.8
Mankins, D.9
Shepard, M.10
Kent, S.11
|