-
1
-
-
4243503866
-
-
Technical Report TISR TIS Labs at Network Associates, Inc., February
-
D. Balenson, D. Branstad, P. Dinsmore, M. Heyman, and C. Scace. Cryptographic Context Negotiation Template. Technical Report TISR #07452-2, TIS Labs at Network Associates, Inc., February 1999.
-
(1999)
Cryptographic Context Negotiation Template
-
-
Balenson, D.1
Branstad, D.2
Dinsmore, P.3
Heyman, M.4
Scace, C.5
-
2
-
-
84940102288
-
Firmato: A novel firew allmanagement toolkit
-
Y. Bartal, A. J. Mayer, K. Nissim, and A. Wool. Firmato: A novel firew allmanagement toolkit. In IEEE Symposium on Security and Privacy, pages 17-31, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.J.2
Nissim, K.3
Wool, A.4
-
4
-
-
84982899264
-
The Role of Trust Management in Distributed Systems Security
-
Secure Internet Programming: Issues in Distributed and Mobile Object Systems, Springer-Verlag New York, NY
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems, volume 1603, pages 185-210. Springer-Verlag Lecture Notes in Computer Science State-of-the-Art series, 1999. New York, NY.
-
(1999)
Lecture Notes in Computer Science State-of-the-Art Series
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
10
-
-
0005909175
-
REFEREE: Trust Management for Web Applications
-
Anguilla, British West Indies, February
-
Y. Chu, J. Feigenbaum,B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust Management for Web Applications. In Proceedings of Financial Cryptography '98, volume 1465, pages 254-274, Anguilla, British West Indies, February 1998.
-
(1998)
Proceedings of Financial Cryptography '98
, vol.1465
, pp. 254-274
-
-
Chu, Y.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
13
-
-
84961696448
-
Policy-Based Security Management for Large Dynamic Groups: A Overview of the DCCM Project
-
DARPA, January Hilton Head, S.C
-
P. Dinsmore, D. Balenson, M. Heyman, P. Kruus, C. Scace, and A. Sherman. Policy-Based Security Management for Large Dynamic Groups: A Overview of the DCCM Project. In Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX '00), pages 64-73. DARPA, January 2000. Hilton Head, S.C.
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX '00)
, pp. 64-73
-
-
Dinsmore, P.1
Balenson, D.2
Heyman, M.3
Kruus, P.4
Scace, C.5
Sherman, A.6
-
14
-
-
0003755277
-
-
RFC 2748, Internet Engineering Task Force, January
-
D. Durham, J. Boyle, R. Cohen, S. Herzog, R. Rajan, and A. Sastry. RFC 2748, The COPS (Common Open Policy Service) Protocol. Internet Engineering Task Force, January 2000.
-
(2000)
The COPS (Common Open Policy Service) Protocol
-
-
Durham, D.1
Boyle, J.2
Cohen, R.3
Herzog, S.4
Rajan, R.5
Sastry, A.6
-
15
-
-
0003603813
-
-
W. H. Freeman and Co., New York, NY, first edition
-
M. R. Carey and D. S. Johnson. Computers and Intractibility, A Guide to the Theory of NP-Completeness. W. H. Freeman and Co., New York, NY, first edition, 1979.
-
(1979)
Computers and Intractibility, A Guide to the Theory of NP-Completeness
-
-
Carey, M.R.1
Johnson, D.S.2
-
20
-
-
0032182406
-
Configuration Management for Highly-Customizable Software
-
M. Hiltunen. Configuration Management for Highly-Customizable Software. IEE Proceedings: Software, 145(5):180-188, 1998.
-
(1998)
IEE Proceedings: Software
, vol.145
, Issue.5
, pp. 180-188
-
-
Hiltunen, M.1
-
22
-
-
0030677524
-
A Logical Language for Expressing Authorizations
-
Oakland, CA, March
-
S. Jajodia, P. Samarati, and V. Subrahmanian. A Logical Language for Expressing Authorizations. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 31-42, Oakland, CA, March 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
-
24
-
-
0005986692
-
Secret-key Agreement without Public-Key Cryptography
-
August
-
T. Leighton and S. Micali. Secret-key Agreement without Public-Key Cryptography. In Proceedings of Crypto 93, pages 456-479, August 1994.
-
(1994)
Proceedings of Crypto
, vol.93
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
25
-
-
0042352269
-
Building Reliable High-Performance Communication Systems from Components
-
ACM
-
X. Liu, C. Kreitz, R. van Renesse, J. Hickey, M. Hayden, K. Birman, and R. Constable. Building Reliable High-Performance Communication Systems from Components. In Proceedings of 17th ACM Symposium on Operating Systems Principles (SOSP'99), volume 33, pages 80-92. ACM, 1999.
-
(1999)
Proceedings of 17th ACM Symposium on Operating Systems Principles (SOSP'99)
, vol.33
, pp. 80-92
-
-
Liu, X.1
Kreitz, C.2
Van Renesse, R.3
Hickey, J.4
Hayden, M.5
Birman, K.6
Constable, R.7
-
28
-
-
84964476016
-
Flexibly Constructing Secure Groups in Antigone 2.0
-
IEEE, June
-
P. McDaniel, A. Prakash, J. Irrer, S. Mittal, and T. Thuang. Flexibly Constructing Secure Groups in Antigone 2.0. In Proceedings of TARPA Information Survivability Conference and Exposition II, pages 55-67. IEEE, June 2001.
-
(2001)
Proceedings of TARPA Information Survivability Conference and Exposition II
, pp. 55-67
-
-
McDaniel, P.1
Prakash, A.2
Irrer, J.3
Mittal, S.4
Thuang, T.5
-
29
-
-
84962274513
-
Representation and Evaluation of Security Policies for Distributed System Services
-
Hilton Head, South Carolina, January DARPA
-
T. Ryutov and C. Neuman. Representation and Evaluation of Security Policies for Distributed System Services. In Proceedings of DARPA Information Survivability Conference and Exposition, pages 172-183, Hilton Head, South Carolina, January 2000. DARPA.
-
(2000)
Proceedings of DARPA Information Survivability Conference and Exposition
, pp. 172-183
-
-
Ryutov, T.1
Neuman, C.2
-
31
-
-
84974750564
-
Authorization in Distributed Systems; A New Approach
-
T. Woo and S. Lam. Authorization in Distributed Systems; A New Approach. Journal of Computer Security, 2(2-3):107-136, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.1
Lam, S.2
-
32
-
-
0031704255
-
Designing a Distributed Authorization Service
-
San Francisco, March IEEE
-
T. Woo and S. Lam. Designing a Distributed Authorization Service. In Proceedings of INFOCOM '98, San Francisco, March 1998. IEEE.
-
(1998)
Proceedings of INFOCOM '98
-
-
Woo, T.1
Lam, S.2
-
33
-
-
0005946920
-
Domain Based Internet Security Policy Management
-
DARPA, January
-
J. Zao, L. Sanchez, M. Condell, C. Lynn, M. Fredette, P. Helinek, P. Krishnan, A. Jackson, D. Mankins, M. Shepard, and S. Kent. Domain Based Internet Security Policy Management. In Proceedings of DARPA Information Survuvability Conference and Exposition, pages 41-53. DARPA, January 2000.
-
(2000)
Proceedings of DARPA Information Survuvability Conference and Exposition
, pp. 41-53
-
-
Zao, J.1
Sanchez, L.2
Condell, M.3
Lynn, C.4
Fredette, M.5
Helinek, P.6
Krishnan, P.7
Jackson, A.8
Mankins, D.9
Shepard, M.10
Kent, S.11
|