-
1
-
-
4143143144
-
Comparison of graph-search algorithms for authorization verification in delegation networks
-
November
-
T. Aura. Comparison of graph-search algorithms for authorization verification in delegation networks. In 2nd Nordic Workshop on Secure Computer Systems NORDSEC'97, November 1997.
-
(1997)
2nd Nordic Workshop on Secure Computer Systems NORDSEC'97
-
-
Aura, T.1
-
2
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Springer-Verlag
-
P. S. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Proceedings of Crypto 2002, volume 2442 of Lectures in Computer Science, pages 354-368. Springer-Verlag, 2002.
-
(2002)
Proceedings of Crypto 2002, Volume 2442 of Lectures in Computer Science
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
4
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press, May
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management, In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164-173. IEEE Computer Society Press, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps.n
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRYPT 2003, pages 416-432, 2003.
-
(2003)
EUROCRYPT 2003
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
7
-
-
4143140890
-
A survey of two signature aggregation techniques
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. A survey of two signature aggregation techniques. CryptoBytes, 6(2), 2003.
-
(2003)
CryptoBytes
, vol.6
, Issue.2
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
8
-
-
84946840347
-
Short signatures from the Weil pairing
-
Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Proceedings of Asiacrypt 2001, volume 2248 of Lectures in Computer Science, pages 514-532. Springer-Verlag, 2001.
-
(2001)
Proceedings of Asiacrypt 2001, Volume 2248 of Lectures in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
13
-
-
0003546303
-
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Yloenen. Simple public key certificate, http://www.ietf.org/rfc/rfc2693.txt.
-
Simple Public Key Certificate
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Yloenen, T.6
-
15
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
C. Gentry. Certificate-based encryption and the certificate revocation problem. In EUROCRYPT 2003, pages 272-293, 2003.
-
(2003)
EUROCRYPT 2003
, pp. 272-293
-
-
Gentry, C.1
-
16
-
-
21144440101
-
Authenticated dictionaries for fresh attribute credentials
-
Springer
-
M. T. Goodrich, M. Shin, R. Tamassia, and W. H. Winsborough. Authenticated dictionaries for fresh attribute credentials. In Proc. Trust Management Conference, volume 2692 of LNCS, pages 332-347. Springer, 2003.
-
(2003)
Proc. Trust Management Conference, Volume 2692 of LNCS
, vol.2692
, pp. 332-347
-
-
Goodrich, M.T.1
Shin, M.2
Tamassia, R.3
Winsborough, W.H.4
-
17
-
-
35248831605
-
Authenticated data structures for graph and geometric searching
-
Springer, LNCS 2612
-
M. T. Goodrich, R. Tamassia, N. Triandopoulos, and R. Cohen. Authenticated data structures for graph and geometric searching. In Proc. RSA Conference - Cryptographers'Track, pages 295-313. Springer, LNCS 2612, 2003.
-
(2003)
Proc. RSA Conference - Cryptographers'Track
, pp. 295-313
-
-
Goodrich, M.T.1
Tamassia, R.2
Triandopoulos, N.3
Cohen, R.4
-
18
-
-
0034428960
-
Policy-directed certificate retrieval
-
September
-
C. A. Gunter and T. Jim. Policy-directed certificate retrieval. Software: Practice and Experience, 30:1609-1640, September 2000.
-
(2000)
Software: Practice and Experience
, vol.30
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
19
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Computer Society Press, May
-
T. Jim. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106-115. IEEE Computer Society Press, May 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
21
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
February
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
22
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
October
-
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shahi. First experiences using XACML for access control in distributed systems. In Proceedings of the ACM Workshop on XML Security 2003, pages 25-37, October 2003.
-
(2003)
Proceedings of the ACM Workshop on XML Security 2003
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shahi, S.5
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21:120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
28
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29, Number 2:38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
31
-
-
84862392463
-
-
http://sunxacml.sourceforge.net/
-
XACML. http://www.oasis-open.org/committees/xacml/ and http://sunxacml.sourceforge.net/.
-
-
-
|