-
1
-
-
33845208188
-
Provably Secure Password-Based Authentication in TLS
-
M. Abdalla, E. Bresson, O. Chevassut, B. Moller, and D. Pointcheval. Provably Secure Password-Based Authentication in TLS. In ACM ASIACCS '06, pages 35-45, 2006.
-
(2006)
ACM ASIACCS '06
, pp. 35-45
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
2
-
-
41149129072
-
Dynamic trust federation in grids
-
M. Ahsant, M. Surridge, T. A. Leonard, A. Krishna, and O.Mulmo. Dynamic trust federation in grids. In The 4th International Conference on Trust Management, 2006.
-
(2006)
The 4th International Conference on Trust Management
-
-
Ahsant, M.1
Surridge, M.2
Leonard, T.A.3
Krishna, A.4
Mulmo, O.5
-
4
-
-
33746629985
-
Ad hoc grid security infrastructure
-
K. Amin, G. von Laszewski, M. Sosonkin, A. Mikler, and M. Hategan. Ad hoc grid security infrastructure. In The 6th IEEE/ACM International Workshop on Grid Computing, pages 69-76, 2005.
-
(2005)
The 6th IEEE/ACM International Workshop on Grid Computing
, pp. 69-76
-
-
Amin, K.1
von Laszewski, G.2
Sosonkin, M.3
Mikler, A.4
Hategan, M.5
-
5
-
-
85016749139
-
Fine-grained control of security capabilities
-
60-82
-
D. Boneh, X. Ding, and G. Tsudik. Fine-grained control of security capabilities. ACM Trans. Inter. Tech., 4(1):60-82, 2004
-
(2004)
ACM Trans. Inter. Tech
, vol.4
, Issue.1
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
-
6
-
-
33745834380
-
Security on the US fusion grid
-
J. Burruss, T. Fredian, and M. Thompson. Security on the US fusion grid. In 5th IAEA TM on Control, Data Acquisition, and Remote Participation for Fusion Research, pages 1949-1955, 2006.
-
(2006)
5th IAEA TM on Control, Data Acquisition, and Remote Participation for Fusion Research
, pp. 1949-1955
-
-
Burruss, J.1
Fredian, T.2
Thompson, M.3
-
8
-
-
47749118585
-
-
S. Chokhani, W. Ford, R. Sabett, C. Merrill, and S. Wu. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, 2003.
-
S. Chokhani, W. Ford, R. Sabett, C. Merrill, and S. Wu. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework, 2003.
-
-
-
-
9
-
-
84948391696
-
A model of certificate revocation
-
D. Cooper. A model of certificate revocation. In IEEE 15th Annual ACSAC, pages 256-264, 1999.
-
(1999)
IEEE 15th Annual ACSAC
, pp. 256-264
-
-
Cooper, D.1
-
10
-
-
0033702950
-
-
D. Cooper. A More Efficient Use of Delta-CRLs. In IEEE Symposium on Security and Privacy, pages 199-202, 2000.
-
D. Cooper. A More Efficient Use of Delta-CRLs. In IEEE Symposium on Security and Privacy, pages 199-202, 2000.
-
-
-
-
12
-
-
9744257937
-
The KX.509 protocol
-
Technical Report 01-2, University of Michigan, February
-
W. Doster, M. Watts, and D. Hyde. The KX.509 protocol. Technical Report 01-2, University of Michigan, February 2001.
-
(2001)
-
-
Doster, W.1
Watts, M.2
Hyde, D.3
-
13
-
-
0003593599
-
-
RFC2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. RFC2693: SPKI Certificate Theory, 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
14
-
-
47749107770
-
-
Enforcer Group. Enforcer Homepage. At http://enforcer.sourceforge.net/, 2006.
-
Enforcer Group. Enforcer Homepage. At http://enforcer.sourceforge.net/, 2006.
-
-
-
-
15
-
-
20444495387
-
Hot service deployment in an ad hoc grid environment
-
New York, NY, USA
-
T. Friese, M. Smith, and B. Freisleben. Hot service deployment in an ad hoc grid environment. In ACM ICSOC '04, pages 75-83, New York, NY, USA, 2004.
-
(2004)
ACM ICSOC '04
, pp. 75-83
-
-
Friese, T.1
Smith, M.2
Freisleben, B.3
-
17
-
-
47749115534
-
-
T. J. Genovese and M. Helm. Grid PKI Disclosure Statement. At http://caops.es.net/Documents/LastCALL/gridpds.pdf, 2003.
-
T. J. Genovese and M. Helm. Grid PKI Disclosure Statement. At http://caops.es.net/Documents/LastCALL/gridpds.pdf, 2003.
-
-
-
-
18
-
-
21144456634
-
Certificate-Based Encryption and the Certificate Revocation Problem
-
C. Gentry. Certificate-Based Encryption and the Certificate Revocation Problem. Advances in Cryptology CEU-ROCRYPT, Springer, 2003.
-
(2003)
Advances in Cryptology CEU-ROCRYPT, Springer
-
-
Gentry, C.1
-
19
-
-
0004256091
-
-
John Wiley & Sons, Inc, New York, NY, USA
-
D. Gollmann. Computer security. John Wiley & Sons, Inc., New York, NY, USA, 1999.
-
(1999)
Computer security
-
-
Gollmann, D.1
-
22
-
-
33747612640
-
A theoretical inter-organizational trust-based security model
-
H. Hexmoor, S. Wilson, and S. Bhattaram. A theoretical inter-organizational trust-based security model. Knowl. Eng. Rev., 21(2):127-161, 2006.
-
(2006)
Knowl. Eng. Rev
, vol.21
, Issue.2
, pp. 127-161
-
-
Hexmoor, H.1
Wilson, S.2
Bhattaram, S.3
-
25
-
-
47749118961
-
-
International Telecommunication Union. ITU-T Recommendation X.509, 1997.
-
International Telecommunication Union. ITU-T Recommendation X.509, 1997.
-
-
-
-
26
-
-
84958063551
-
On certificate revocation and validation
-
Springer-Verlag
-
P. Kocher. On certificate revocation and validation. Financial Cryptography ,Springer-Verlag, 1465:172-177, 1998.
-
(1998)
Financial Cryptography
, vol.1465
, pp. 172-177
-
-
Kocher, P.1
-
27
-
-
85084164300
-
Kerberized credential translation: A solution to web access control
-
O. Kornievskaia, P. Honeyman, B. Doster, and K. Coffman. Kerberized credential translation: A solution to web access control. In 10th Usenix Security Symposium, pages 235-250, 2001.
-
(2001)
10th Usenix Security Symposium
, pp. 235-250
-
-
Kornievskaia, O.1
Honeyman, P.2
Doster, B.3
Coffman, K.4
-
28
-
-
0003243695
-
SETI@home-Massively Distributed Computing for SETI
-
E. Korpela, D. Werthimer, D. Anderson, J. Cobb, and M. Lebofsky. SETI@home-Massively Distributed Computing for SETI. IEEE MultiMedia, 3(1):78-83, 1996.
-
(1996)
IEEE MultiMedia
, vol.3
, Issue.1
, pp. 78-83
-
-
Korpela, E.1
Werthimer, D.2
Anderson, D.3
Cobb, J.4
Lebofsky, M.5
-
30
-
-
38649141160
-
A New Modified Bridge Certification Authority PKI Trust Model
-
IEEE Computer Society
-
M. Li, Y. Ren, Z. Wang, J. Xie, and H. Yao;. A New Modified Bridge Certification Authority PKI Trust Model. In 1st International Symposium on Pervasive Computing and Applications, pages 23-26. IEEE Computer Society, 2006.
-
(2006)
1st International Symposium on Pervasive Computing and Applications
, pp. 23-26
-
-
Li, M.1
Ren, Y.2
Wang, Z.3
Xie, J.4
Yao, H.5
-
31
-
-
33646262102
-
-
A. Lioy,M.Marian, N.Moltchanova, andM. Pala. PKI past, present and future. International Journal of Information Security, Springer Berlin, pages 18-29, 2006.
-
A. Lioy,M.Marian, N.Moltchanova, andM. Pala. PKI past, present and future. International Journal of Information Security, Springer Berlin, pages 18-29, 2006.
-
-
-
-
33
-
-
47749139509
-
Shemp: Secure hardware enhanced myproxy
-
Technical Report 05-532, Dartmouth College, February
-
J. Marchesini and S. Smith. Shemp: Secure hardware enhanced myproxy. Technical Report 05-532, Dartmouth College, February 2005.
-
(2005)
-
-
Marchesini, J.1
Smith, S.2
-
36
-
-
24944532382
-
NOVOMODO: Scable Certificate Validation And Simplified PKI Management
-
S.Micali. NOVOMODO: Scable Certificate Validation And Simplified PKI Management. In 1st Annual PKI Research Workshop, 2002.
-
(2002)
1st Annual PKI Research Workshop
-
-
Micali, S.1
-
38
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Springer-Verlag
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Crypto 1984, Springer-Verlag, pages 47-53, 1985.
-
(1985)
Crypto 1984
, pp. 47-53
-
-
Shamir, A.1
-
41
-
-
38849142002
-
-
TCPA Group, Alliance. At, 2006
-
TCPA Group. Trusted Computing Platform Alliance. At http://www. trustedcomputinggroup.org, 2006.
-
Trusted Computing Platform
-
-
-
42
-
-
0004001001
-
-
RFC3820
-
S. Tuecke, V. Welch, D. Engert, L. Perlman, and M. Thompson. RFC3820: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile, 2004.
-
(2004)
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Perlman, L.4
Thompson, M.5
-
43
-
-
33646227456
-
Distributing Security-mediated PKI
-
G. Vanrenen, S. Smith, and J. Marchesini. Distributing Security-mediated PKI. International Journal of Information Security, Springer, pages 3-17, 2006.
-
(2006)
International Journal of Information Security, Springer
, pp. 3-17
-
-
Vanrenen, G.1
Smith, S.2
Marchesini, J.3
-
44
-
-
84957590301
-
Infogram: A peer-to-peer information and job submission service
-
G. von Laszewski, J. Gawor, C. J. Pena, and I. Foster. Infogram: A peer-to-peer information and job submission service. In 11th Symposium on High Performance Distributed Computing, pages 33-42, 2002.
-
(2002)
11th Symposium on High Performance Distributed Computing
, pp. 33-42
-
-
von Laszewski, G.1
Gawor, J.2
Pena, C.J.3
Foster, I.4
-
45
-
-
47749151686
-
Proxy certificate revocation in grid and a practical implementation framework
-
S. Zhao, A. Aggarwal, and R. D. Kent. Proxy certificate revocation in grid and a practical implementation framework. In Proc. 8th ACIS/IEEE SNPD, 2007.
-
(2007)
Proc. 8th ACIS/IEEE SNPD
-
-
Zhao, S.1
Aggarwal, A.2
Kent, R.D.3
-
46
-
-
33645797144
-
Tradeoffs in certificate revocation schemes
-
P. Zheng. Tradeoffs in certificate revocation schemes. ACM SIGCOMM Comput. Commun. Rev., 33(2):103-112, 2003.
-
(2003)
ACM SIGCOMM Comput. Commun. Rev
, vol.33
, Issue.2
, pp. 103-112
-
-
Zheng, P.1
-
47
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|