-
1
-
-
0030644181
-
On sdsi's linked local name spaces
-
Washington, DC, USA, IEEE Computer Society
-
M. Abadi. On sdsi's linked local name spaces. In Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), page 98, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97)
, pp. 98
-
-
Abadi, M.1
-
2
-
-
84958752287
-
Towards a survivable security architecture for ad-hoc networks
-
Proc. Security Protocols, 9th International Workshop, of, Cambridge, UK, Apr, Springer
-
T. Aura and S. Mäki. Towards a survivable security architecture for ad-hoc networks. In Proc. Security Protocols, 9th International Workshop, volume 2467 of LNCS, pages 63-79, Cambridge, UK, Apr. 2001. Springer.
-
(2001)
LNCS
, vol.2467
, pp. 63-79
-
-
Aura, T.1
Mäki, S.2
-
3
-
-
0004078695
-
-
version 2, September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The keynote trust-management system, version 2, September 1999.
-
(1999)
The keynote trust-management system
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
4
-
-
18844392414
-
Tapi: Transactions for accessing public infrastructure
-
M. Blaze, J. Ioannidis, S. Ioannidis, A. Keromytis, P. Nikander, and V. Prevelakis. Tapi: Transactions for accessing public infrastructure. In Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference, 2003.
-
(2003)
Proceedings of the 8th IFIP Personal Wireless Communications (PWC) Conference
-
-
Blaze, M.1
Ioannidis, J.2
Ioannidis, S.3
Keromytis, A.4
Nikander, P.5
Prevelakis, V.6
-
7
-
-
0003593599
-
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. L. Rivest, B. Thomas, and T. Ylonen. Spki certificate theory, September 1999.
-
(1999)
Spki certificate theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
19644392791
-
Using trust management to support transferable hash-based micropayments
-
Gosier, Guadeloupe, FWI, January
-
S. Foley. Using trust management to support transferable hash-based micropayments. In Proceedings of the 7th International Financial Cryptography Conference, Gosier, Guadeloupe, FWI, January 2003.
-
(2003)
Proceedings of the 7th International Financial Cryptography Conference
-
-
Foley, S.1
-
10
-
-
33947675856
-
Believing in the integrity of a system
-
IJCAR Workshop on Automated Reasoning for Security Protocol Analysis
-
S. Foley. Believing in the integrity of a system. In IJCAR Workshop on Automated Reasoning for Security Protocol Analysis. Springer Verlag Electronic Notes in Computer Science, 2004.
-
(2004)
Springer Verlag Electronic Notes in Computer Science
-
-
Foley, S.1
-
11
-
-
33745645098
-
Authorisation subterfuge by delegation in decentralised networks
-
Cambridge, UK, April
-
S. N. Foley and H. Zhou. Authorisation subterfuge by delegation in decentralised networks. In International Security Protocols Workshop, Cambridge, UK, April 2005.
-
(2005)
International Security Protocols Workshop
-
-
Foley, S.N.1
Zhou, H.2
-
13
-
-
0031120737
-
Enclaves: Enabling secure collaboration over the internet
-
L. Gong. Enclaves: Enabling secure collaboration over the internet. IEEE Journal on Selected Areas in Communications, 15(3):567-575, 1997.
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.3
, pp. 567-575
-
-
Gong, L.1
-
14
-
-
33947624222
-
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile, April 2002.
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile, April 2002.
-
-
-
-
16
-
-
62349090353
-
RT: A role-based trust-management framework
-
Washington, D.C, April, IEEE Computer Society Press, Los Alamitos, California
-
N. Li and J. C. Mitchell. RT: A role-based trust-management framework. In The Third DARPA Information Survivability Conference and Exposition (DISCEX III), pages 201-212, Washington, D.C., April 2003. IEEE Computer Society Press, Los Alamitos, California.
-
(2003)
The Third DARPA Information Survivability Conference and Exposition (DISCEX III)
, pp. 201-212
-
-
Li, N.1
Mitchell, J.C.2
-
17
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
February
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC), 6(1):128-171, February 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
18
-
-
0000788149
-
Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
-
N. H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. ACM Transactions on Software Engineering and Methodology, 9(3):273-305, 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.3
, pp. 273-305
-
-
Minsky, N.H.1
Ungureanu, V.2
-
19
-
-
33947660020
-
-
L. Pearlman, C. Kesselman, V. Welch, 1. Foster, and S. Tuecke. The community authorization service: Status and future. In CHEP03, La Jolla, California, March 2003.
-
L. Pearlman, C. Kesselman, V. Welch, 1. Foster, and S. Tuecke. The community authorization service: Status and future. In CHEP03, La Jolla, California, March 2003.
-
-
-
|