메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 89-103

Understanding SPKI/SDSI using first-order logic

Author keywords

Access control; Algorithm design and analysis; Authorization; Availability; Computer science; Computer security; Data security; Logic; Public key; Safety

Indexed keywords

ACCIDENT PREVENTION; ALGORITHMS; AVAILABILITY; C (PROGRAMMING LANGUAGE); COMPUTATIONAL LINGUISTICS; COMPUTER SCIENCE; FORMAL LOGIC; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS;

EID: 33947617835     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212707     Document Type: Conference Paper
Times cited : (31)

References (26)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • Martín Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 5
    • 0021509216 scopus 로고
    • Linear-time algorithms for testing the satisfiability of propositional horn formulae
    • William F. Dowling and Jean H. Gallier. Linear-time algorithms for testing the satisfiability of propositional horn formulae. Journal of Logic Programming, 1(3):267-284, 1984.
    • (1984) Journal of Logic Programming , vol.1 , Issue.3 , pp. 267-284
    • Dowling, W.F.1    Gallier, J.H.2
  • 12
    • 77955202238 scopus 로고    scopus 로고
    • Analysis of SPKI/SDSI certificates using model checking
    • IEEE Computer Society Press, June
    • Somesh Jha and Thomas Reps. Analysis of SPKI/SDSI certificates using model checking. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, pages 129-144. IEEE Computer Society Press, June 2002.
    • (2002) Proceedings of the 15th IEEE Computer Security Foundations Workshop , pp. 129-144
    • Jha, S.1    Reps, T.2
  • 15
    • 0026684778 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • November
    • Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
    • (1992) ACM Transactions on Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 22
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • February
    • Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 24
    • 0000829789 scopus 로고
    • Uniform Proofs as a Foundation for Logic Programming
    • Elsevier Science
    • Dale Miller, Gopalan Nadathur, Frank Pfenning, and Andre Scedrov. Uniform Proofs as a Foundation for Logic Programming, volume 51 of Annals of Pure and Applied Logic, pages 125-157. Elsevier Science, 1991.
    • (1991) Annals of Pure and Applied Logic , vol.51 , pp. 125-157
    • Miller, D.1    Nadathur, G.2    Pfenning, F.3    Scedrov, A.4
  • 25
    • 0347367138 scopus 로고    scopus 로고
    • Correspondences between classical, intuitionistic and uniform provability
    • Gopalan Nadathur. Correspondences between classical, intuitionistic and uniform provability. Theoretical Computer Science, 232(1-2):273-298, 2000.
    • (2000) Theoretical Computer Science , vol.232 , Issue.1-2 , pp. 273-298
    • Nadathur, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.