-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson and G. Plotkin, A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems 15(4) (1993), 706-734.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
0033281265
-
-
A.W. Appel and E.W. Felten, Proof carrying authentication, in: Proceedings of the 6th Conference on Computer and Communications Security, Singapore, November 1999, G. Tsudik, ed., ACM Press, 1999.
-
A.W. Appel and E.W. Felten, Proof carrying authentication, in: Proceedings of the 6th Conference on Computer and Communications Security, Singapore, November 1999, G. Tsudik, ed., ACM Press, 1999.
-
-
-
-
7
-
-
0022614501
-
A global authentication service without global trust
-
A. Birrell, B.W. Lampson, R.M. Needham and M.D. Schroeder, A global authentication service without global trust, in: IEEE Symposium on Security and Privacy, 1986, pp. 223-230.
-
(1986)
IEEE Symposium on Security and Privacy
, pp. 223-230
-
-
Birrell, A.1
Lampson, B.W.2
Needham, R.M.3
Schroeder, M.D.4
-
9
-
-
34249898231
-
Decentralized trust management
-
Technical Report 96-17, DIMACS, June 28
-
M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management, Technical Report 96-17, DIMACS, June 28 1996.
-
(1996)
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, ACM Transactions on Computer Systems 8(1) (1990), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
ACM, May
-
D. Denning, A lattice model of secure information flow, in: Communications of the ACM, ACM, May 1976, pp. 236-243.
-
(1976)
Communications of the ACM
, pp. 236-243
-
-
Denning, D.1
-
13
-
-
0003593599
-
-
RFC 2693, September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen, SPKI certificate theory. RFC 2693, September 1999.
-
(1999)
SPKI certificate theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
15
-
-
0034428960
-
Policy-directed certificate retrieval
-
C.A. Gunter and T. Jim, Policy-directed certificate retrieval, Software: Practice & Experience 30(15) (2000), 1609-1640.
-
(2000)
Software: Practice & Experience
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
16
-
-
33744497855
-
Delegation depth control in trust-management system
-
IEEE Computer Society, Washington, DC, USA
-
F. Hong, X. Zhu and S. Wang, Delegation depth control in trust-management system, in: AINA'05: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, IEEE Computer Society, Washington, DC, USA, 2005, pp. 411-414.
-
(2005)
AINA'05: Proceedings of the 19th International Conference on Advanced Information Networking and Applications
, pp. 411-414
-
-
Hong, F.1
Zhu, X.2
Wang, S.3
-
20
-
-
0036085965
-
Design of a role-based trust-management framework
-
IEEE Computer Society Press, May
-
N. Li, J.C. Mitchell and W.H. Winsborough, Design of a role-based trust-management framework, in: Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 2002, pp. 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
21
-
-
0037243196
-
Distributed chain discovery in trust management
-
N. Li, W.H. Winsborough and J.C. Mitchell, Distributed chain discovery in trust management, Journal of Computer Security 11(1) (2003), 35-86.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
24
-
-
84942241879
-
On generalized authorization problems
-
IEEE Computer Society
-
S. Schwoon, S. Jha, T.W. Reps and S.G. Stubblebine, On generalized authorization problems, in: CSFW, IEEE Computer Society, 2003, pp. 202-.
-
(2003)
CSFW
, pp. 202
-
-
Schwoon, S.1
Jha, S.2
Reps, T.W.3
Stubblebine, S.G.4
|