-
1
-
-
0004078695
-
-
IETF RFC 2704, September
-
Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote trust-management system, version 2. IETF RFC 2704, September 1999.
-
(1999)
The KeyNote Trust-management System, Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
3
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Morcos, and Ronald L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
4
-
-
0003593599
-
-
IETF RFC 2693, September
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylonen. SPKI certificate theory. IETF RFC 2693, September 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
5
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Computer Society Press, May
-
Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, and Yiftach Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 2-14. IEEE Computer Society Press, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
7
-
-
84942417001
-
Distributed credential chain discovery in trust management
-
To appear in Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8)
-
Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. To appear in Journal of Computer Security. Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8).
-
Journal of Computer Security
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
9
-
-
0037669985
-
Protecting privacy during online trust negotiation
-
Springer-Verlag, April
-
Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, and Ryan Jarvis. Protecting privacy during online trust negotiation. In2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag, April 2002.
-
(2002)
2nd Workshop on Privacy Enhancing Technologies
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
10
-
-
1642395221
-
Protecting sensitive attributes in automated trust negotiation
-
ACM Press, November
-
William H. Winsborough and Ninghui Li. Protecting sensitive attributes in automated trust negotiation. InWorkshop on Privacy in the Electronic Society. ACM Press, November 2002.
-
(2002)
Workshop on Privacy in the Electronic Society
-
-
Winsborough, W.H.1
Li, N.2
-
12
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, January
-
William H. Winsborough, Kent E. Seamons, and Vicki E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume I, pages 88-102. IEEE Press, January 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
14
-
-
84942467256
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
to appear. Extended abstract appeared in Proceedings of the Eight ACM Conference on Computer and Communications Security (CCS-8)
-
Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), to appear. Extended abstract appeared in Proceedings of the Eight ACM Conference on Computer and Communications Security (CCS-8).
-
ACM Transactions on Information and System Security (TISSEC)
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|