-
1
-
-
84860057830
-
-
See http://dictionary.reference.com/search?=delegate
-
-
-
-
4
-
-
33646028994
-
Shibboleth architecture, protocols and profiles
-
22 September
-
Scot Cantor. "Shibboleth Architecture, Protocols and Profiles, Working Draft 02, 22 September 2004, see http://shibboleth.internet2.edu/
-
(2004)
Working Draft
, vol.2
-
-
Cantor, S.1
-
5
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn And Ramaswamy Chandramouli. "Proposed NIST Standard for Role-Based Access Control". ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, Pages 224-274
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Richard Kuhn, D.4
Chandramouli, R.5
-
6
-
-
84860051791
-
-
Internet2 Middleware Architecture Committee for Education, Directory Working Group (MACE-Dir) December
-
Internet2 Middleware Architecture Committee for Education, Directory Working Group (MACE-Dir) "EduPerson Specification (200312)", December 2003. Available from http://www.nmi-edit.org/eduPerson/internet2-mace-dir- eduperson-200312.html
-
(2003)
EduPerson Specification (200312)
-
-
-
7
-
-
0003358457
-
SPKI certificate theory
-
Sept
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen. "SPKI Certificate Theory". RFC 2693, Sept 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
0036086099
-
Constrained delegation
-
Oakland, CA, May. IEEE Computer Society Press
-
O. Bandmann, M. Dam, and B. Sadighi Firozabadi."Constrained delegation". In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages131-140, Oakland, CA, May 2002. IEEE Computer Society Press.
-
(2002)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 131-140
-
-
Bandmann, O.1
Dam, M.2
Sadighi Firozabadi, B.3
-
11
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
October 31-31, Fairfax, Virginia
-
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis Kafura, Sumit Shah. "First experiences using XACML for access control in distributed systems". Proceedings of the 2003 ACM workshop on XML security, October 31-31, 2003, Fairfax, Virginia
-
(2003)
Proceedings of the 2003 ACM Workshop on XML Security
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
13
-
-
84860042587
-
VOMS: An authorization system for virtual organizations, 1st European across grids conference
-
13-14 February
-
Alfieri R, et al. VOMS: an authorization system for virtual organizations, 1st European across grids conference, Santiago de Compostela. 13-14 February 2003. Available from: http://grid-auth.infn.it/docs/VOMS- Santiago.pdf
-
(2003)
Santiago de Compostela
-
-
Alfieri, R.1
-
14
-
-
33845222790
-
Identity federation and attribute-based authorization through the globus Toolkit, Shibboleth, GridShib, and MyProxy
-
To be presented at, April
-
Tom Barton, Jim Basney, Tim Freeman, Tom Scavo, Frank Siebenlist, Von Welch, Rachana Ananthakrishnan, Bill Baker, Kate Keahey. "Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy". To be presented at NIST PKI Workshop, April 2006.
-
(2006)
NIST PKI Workshop
-
-
Barton, T.1
Basney, J.2
Freeman, T.3
Scavo, T.4
Siebenlist, F.5
Welch, V.6
Ananthakrishnan, R.7
Baker, B.8
Keahey, K.9
-
15
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest. "Certificate chain discovery in SPKI/SDSI". Journal of Computer Security, Issue: Volume 9, Number 4 / 2001, Pages: 285-322
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
16
-
-
85180773761
-
Building certificate paths: Forward vs. reverse
-
Internet Society, February
-
Y. Elley, A. Anderson, S. Hanna, S. Mullan, R. Perlman and S. Proctor, "Building certificate paths: Forward vs. reverse". Proceedings of the 2001 Network and Distributed System Security Symposium (NDSS'01), Internet Society, February 2001, pp. 153-160.
-
(2001)
Proceedings of the 2001 Network and Distributed System Security Symposium (NDSS'01)
, pp. 153-160
-
-
Elley, Y.1
Anderson, A.2
Hanna, S.3
Mullan, S.4
Perlman, R.5
Proctor, S.6
-
19
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
-
April
-
Housley, R., Ford, W., Polk, W., and Solo, D., "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," RFC 3280, April 2000
-
(2000)
RFC
, vol.3280
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
20
-
-
46449084609
-
Authorisation using attributes from multiple authorities
-
June, Manchester, UK
-
David Chadwick. "Authorisation using Attributes from Multiple Authorities" in Proceedings of WET-ICE 2006, June 2006, Manchester, UK
-
(2006)
Proceedings of WET-ICE 2006
-
-
Chadwick, D.1
|