-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
Abadi, M.: On SDSI's linked local name spaces. Journal of Computer Security 6(1-2), 3-21 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
3
-
-
0033684451
-
A security infrastructure for distributed Java applications
-
IEEE Computer Society Press, Los Alamitos
-
Balfanz, D., Dean, D., Spreitzer, M.: A security infrastructure for distributed Java applications. In: Proceedings of the 2000 IEEE Symposium on Security & Privacy, IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security & Privacy
-
-
Balfanz, D.1
Dean, D.2
Spreitzer, M.3
-
4
-
-
27544508109
-
Distributed proving in acess-control systems
-
IEEE Computer Society Press, Los Alamitos
-
Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in acess-control systems. In: Proceedings of the 2005 IEEE Symposium on Security & Privacy, IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security & Privacy
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
5
-
-
38049009015
-
Efficient proving for practical distributed access-control systems
-
Technical Report CMU-CyLab-06-015R, Carnegie Mellon University
-
Bauer, L., Garriss, S., Reiter, M.K.: Efficient proving for practical distributed access-control systems. Technical Report CMU-CyLab-06-015R, Carnegie Mellon University (2007)
-
(2007)
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
7
-
-
4944223328
-
Cassandra: Flexible trust management, applied to electronic health records
-
IEEE Computer Society Press, Los Alamitos
-
Becker, M., Sewell, P.: Cassandra: Flexible trust management, applied to electronic health records. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop
-
-
Becker, M.1
Sewell, P.2
-
8
-
-
84958048748
-
Compliance checking in the PolicyMaker trustmanagement system
-
Hirschfeld, R, ed, FC, Springer, Heidelberg
-
Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the PolicyMaker trustmanagement system. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1465
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
9
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18-36 (1990)
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
0029695436
-
Tabled evaluation with delaying for general logic programs
-
Chen, W., Warren, D.S.: Tabled evaluation with delaying for general logic programs. Journal of the ACM 43(1), 20-74 (1996)
-
(1996)
Journal of the ACM
, vol.43
, Issue.1
, pp. 20-74
-
-
Chen, W.1
Warren, D.S.2
-
12
-
-
0003593599
-
-
RFC2693
-
Ellison, C.M., Frantz, B., Lampson, B., Rivest, R.L., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory, RFC2693 (1999)
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylonen, T.6
-
13
-
-
0011002458
-
Implementing tactics and tacticals in a higher-order logic programming language
-
Felty, A.: Implementing tactics and tacticals in a higher-order logic programming language. Journal of Automated Reasoning 11(1), 43-81 (1993)
-
(1993)
Journal of Automated Reasoning
, vol.11
, Issue.1
, pp. 43-81
-
-
Felty, A.1
-
15
-
-
33646048955
-
Greenpass: Decentralized, PKI-based authorization for wireless LANs
-
Goffee, N.C., Kim, S.H., Smith, S., Taylor, P., Zhao, M., Marchesini, J.: Greenpass: Decentralized, PKI-based authorization for wireless LANs. In: Proceedings of the 3rd Annual PKI Research and Development Workshop (2004)
-
(2004)
Proceedings of the 3rd Annual PKI Research and Development Workshop
-
-
Goffee, N.C.1
Kim, S.H.2
Smith, S.3
Taylor, P.4
Zhao, M.5
Marchesini, J.6
-
17
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Computer Society Press, Los Alamitos
-
Jim, T.: SD3: A trust management system with certified evaluation. In: Proceedings of the 2001 IEEE Symposium on Security & Privacy, IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security & Privacy
-
-
Jim, T.1
-
18
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265-310 (1992)
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
20
-
-
84948440714
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, Los Alamitos
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security & Privacy, IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security & Privacy
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
22
-
-
0003584577
-
-
2nd edn. Prentice Hall, Englewood Cliffs
-
Russell, S., Norvig, P.: Artificial Intelligence, A Modern Approach, 2nd edn. Prentice Hall, Englewood Cliffs (2003)
-
(2003)
Artificial Intelligence, A Modern Approach
-
-
Russell, S.1
Norvig, P.2
|