-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
April
-
E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational data management systems. ACM Transactions on Information Systems (TISSEC), 17(2): 101-140, April 1999.
-
(1999)
ACM Transactions on Information Systems (TISSEC)
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
3
-
-
84904350804
-
A hybrid pki model: Application to secure mediation
-
16th Annual IFIP WG 11.3 Working Conference on Data and Application Security . Kluwer Academic Publishers, Boston
-
J. Biskup and Y. Karabulut. A hybrid pki model: Application to secure mediation. In Research Directions in Data and Application Security, 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, pages 271-282. Kluwer Academic Publishers, Boston, 2003.
-
(2003)
Research Directions in Data and Application Security
, pp. 271-282
-
-
Biskup, J.1
Karabulut, Y.2
-
4
-
-
84982899264
-
The role of trust management in distributed systems security
-
Springer Verlag, Berlin, July
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems, volume 1603 of Lecture Notes in Computer Science, pages 183-210. Springer Verlag, Berlin, July 1999.
-
(1999)
Secure Internet Programming: Issues in Distributed and Mobile Object Systems, Volume 1603 of Lecture Notes in Computer Science
, vol.1603
, pp. 183-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
5
-
-
0029700344
-
Decentralized trust managment
-
IEEE Computer Society Press, May
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and J. Lacy. Decentralized trust managment. In Proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, CA, pages 164-173. IEEE Computer Society Press, May 1996.
-
(1996)
Proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, CA
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Lacy, J.4
-
6
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
P. Bonatti, S. Capitani di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and System Security (TISSEC), 5(1):1-35, February 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Capitani Di Vimercati, S.2
Samarati, P.3
-
8
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
ACM Press
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. In Communications of the ACM 28, volume 10, pages 1030-1044. ACM Press, 1985.
-
(1985)
Communications of the ACM 28
, vol.10
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. M. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9:285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.M.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
10
-
-
0003546303
-
-
July
-
C. M. Ellison, B. Frantz, B. Lampson, R. L. Rivest, B. M. Thomas, and T. Ylonen. Simple public key certificate, http://world.std.com/cme/html/spki.html, July 1999.
-
(1999)
Simple Public Key Certificate
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylonen, T.6
-
11
-
-
0003358457
-
SPKI certificate theory
-
September
-
C. M. Ellison, B. Frantz, B. Lampson, R. L. Rivest, B. M. Thomas, and T. Ylonen. SPKI certificate theory. Internet RFC 2693, September 1999.
-
(1999)
Internet RFC
, vol.2693
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.M.5
Ylonen, T.6
-
13
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
June
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. ACM SIGMOD Record, 26(2):474-485, June 1997.
-
(1997)
ACM SIGMOD Record
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
14
-
-
33947617835
-
Understanding SPKI/SDSI using first-order logic
-
CSFW 2003, Pacific Grove, California, USA, IEEE Computer Society Press, June
-
N. Li and J. C. Mitchell. Understanding SPKI/SDSI using first-order logic. In Proceedings of the 16th. IEEE Computer Security Foundations Workshop, pages 89-108. CSFW 2003, Pacific Grove, California, USA, IEEE Computer Society Press, June 2003.
-
(2003)
Proceedings of the 16th. IEEE Computer Security Foundations Workshop
, pp. 89-108
-
-
Li, N.1
Mitchell, J.C.2
-
16
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, editors . FOSAD 2000, Bertinoro, Italy, Springer Verlag, Berlin, October
-
P. Samarati and S. Capitani di Vimercati. Access control: policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design (FOSAD), volume 2171 of Lecture Notes in Computer Science, pages 137-196. FOSAD 2000, Bertinoro, Italy, Springer Verlag, Berlin, October 2001.
-
(2001)
Foundations of Security Analysis and Design (FOSAD), Volume 2171 of Lecture Notes in Computer Science
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
Capitani Di Vimercati, S.2
-
17
-
-
2642573551
-
A compositional framework for access control policies enforcement
-
FMSE 2003, Washington, DC, USA, ACM Press, October
-
F. Siede, A. Cau, and H. Zedan. A compositional framework for access control policies enforcement. In Proceedings of the ACM Workshop on Formal Methods in Security Engineering, pages 32-42. FMSE 2003, Washington, DC, USA, ACM Press, October 2003.
-
(2003)
Proceedings of the ACM Workshop on Formal Methods in Security Engineering
, pp. 32-42
-
-
Siede, F.1
Cau, A.2
Zedan, H.3
-
19
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2:107-136, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
20
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1):1-42, February 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|