-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
Martín Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
October
-
Martín Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, October 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
4
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
5
-
-
0021509216
-
Linear-time algorithms for testing the satisfiability of propositional horn formulae
-
William F. Dowling and Jean H. Gallier. Linear-time algorithms for testing the satisfiability of propositional horn formulae. Journal of Logic Programming, 1(3):267-284, 1984.
-
(1984)
Journal of Logic Programming
, vol.1
, Issue.3
, pp. 267-284
-
-
Dowling, W.F.1
Gallier, J.H.2
-
6
-
-
0003593599
-
-
IETF RFC 2693, September
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylonen. SPKI certificate theory. IETF RFC 2693, September 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
7
-
-
0003546303
-
-
Internet Draft (work in progress), July Available at
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylonen. Simple public key certificates. Internet Draft (work in progress), July 1999. Available at http://world.std.com/~cme/spki.txt.
-
(1999)
Simple Public Key Certificates
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
12
-
-
77955202238
-
Analysis of SPKI/SDSI certificates using model checking
-
IEEE Computer Society Press, June
-
Somesh Jha and Thomas Reps. Analysis of SPKI/SDSI certificates using model checking. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 129-144. IEEE Computer Society Press, June 2002.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 129-144
-
-
Jha, S.1
Reps, T.2
-
13
-
-
0029359817
-
Constraint query languages
-
August
-
Paris C. Kanellakis, Gabriel M. Kuper, and Peter Z. Revesz. Constraint query languages. Journal of Computer and System Sciences, 51(1):26-52, August 1995.
-
(1995)
Journal of Computer and System Sciences
, vol.51
, Issue.1
, pp. 26-52
-
-
Kanellakis, P.C.1
Kuper, G.M.2
Revesz, P.Z.3
-
15
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
November
-
Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
17
-
-
0041524661
-
Delegation Logic: A logic-based approach to distributed authorization
-
February
-
Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM Transaction on Information and System Security (TISSEC), 6(1):128-171, February 2003.
-
(2003)
ACM Transaction on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
19
-
-
33646250342
-
-
August Unpublished manuscript. Available at
-
Ninghui Li, John C. Mitchell, Yu Qiu, William H. Winsborough, Kent E. Seamons, Michael Halcrow, and Jared Jacobson. RTML: A Role-based Trust-management Markup Language, August 2002. Unpublished manuscript. Available at http://crypto.stanford.edu/~ninghui/papers/rtml.pdf.
-
(2002)
RTML: A Role-based Trust-management Markup Language
-
-
Li, N.1
Mitchell, J.C.2
Qiu, Y.3
Winsborough, W.H.4
Seamons, K.E.5
Halcrow, M.6
Jacobson, J.7
-
22
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
February
-
Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
24
-
-
0000829789
-
Uniform Proofs as a Foundation for Logic Programming
-
Elsevier Science
-
Dale Miller, Gopalan Nadathur, Frank Pfenning, and Andre Scedrov. Uniform Proofs as a Foundation for Logic Programming, volume 51 of Annals of Pure and Applied Logic, pages 125-157. Elsevier Science, 1991.
-
(1991)
Annals of Pure and Applied Logic
, vol.51
, pp. 125-157
-
-
Miller, D.1
Nadathur, G.2
Pfenning, F.3
Scedrov, A.4
-
25
-
-
0347367138
-
Correspondences between classical, intuitionistic and uniform provability
-
Gopalan Nadathur. Correspondences between classical, intuitionistic and uniform provability. Theoretical Computer Science, 232(1-2):273-298, 2000.
-
(2000)
Theoretical Computer Science
, vol.232
, Issue.1-2
, pp. 273-298
-
-
Nadathur, G.1
|