-
1
-
-
0004078695
-
-
IETF RFC 2704
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust-Management System, Version 2. IETF RFC 2704 (1999). www.ietf.org/ rfc/rfc2704.txt
-
(1999)
The KeyNote Trust-Management System, Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
2
-
-
0029700344
-
Decentralized trust management
-
In: IEEE Computer Society Press, Washington, DC
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173. IEEE Computer Society Press, Washington, DC (1996). www.crypto.com/papers/policymaker.pdf
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke D., Elien J.E., Ellison C., Fredette M., Morcos A., Rivest R.L.: Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9(4), 285-322 (2001)
-
(2001)
J. Comput. Secur.
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
4
-
-
0036083264
-
Binder, a logic-based security language
-
In: IEEE Computer Society Press, Washington, DC
-
DeTreville, J.: Binder, a logic-based security language. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 105-113. IEEE Computer Society Press, Washington, DC (2002)
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 105-113
-
-
DeTreville, J.1
-
5
-
-
0003593599
-
-
IETF RFC 2693
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. IETF RFC 2693 (1999)
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
6
-
-
0034428960
-
Policy-directed certificate retrieval
-
Gunter C.A., Jim T.: Policy-directed certificate retrieval. Softw. Pract. Exp. 30(15), 1609-1640 (2000)
-
(2000)
Softw. Pract. Exp.
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
7
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
In: IEEE Computer Society Press, Washington, DC
-
Jim, T.: SD3: A trust management system with certified evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 106-115. IEEE Computer Society Press, Washington, DC (2001)
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
8
-
-
0041524661
-
Delegation Logic: A logic-based approach to distributed authorization
-
Li N., Grosof B.N., Feigenbaum J.: Delegation Logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1), 128-171 (2003)
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
9
-
-
0036085965
-
Design of a role-based trust management framework
-
In: IEEE Computer Society Press, Washington, DC
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114-130. IEEE Computer Society Press, Washington, DC (2002)
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
10
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li N., Winsborough W.H., Mitchell J.C.: Distributed credential chain discovery in trust management. J. Comput. Secur. 11(1), 35-86 (2003)
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
13
-
-
50049125824
-
-
Server's benchmarks. www.sun.com/servers/coolthreads/t1000/benchmarks.jsp
-
Server's Benchmarks
-
-
-
14
-
-
84939548725
-
Automated trust negotiation
-
In: IEEE Press, New York
-
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, vol. I, pp. 88-102. IEEE Press, New York (2000)
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
15
-
-
0036871183
-
Negotiating trust on the web
-
Winslett M., Yu T., Seamons K.E., Hess A., Jacobson J., Jarvis R., Smith B., Yu L.: Negotiating trust on the web. IEEE Internet Comput. 6(6), 30-37 (2002)
-
(2002)
IEEE Internet Comput
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
16
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu T., Winslett M., Seamons K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1), 1-42 (2003)
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
17
-
-
30644473909
-
Adaptive trust negotiation and access control
-
Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.E.: Adaptive trust negotiation and access control. In: Proceedings of the tenth ACM symposium on Access control models and technologies (SACMT), pp. 139-146 (2005)
-
(2005)
Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies (SACMT)
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
18
-
-
85180810679
-
Advanced client/server authentication in TLS
-
Hess, A., Jacobson, J., Mills, H., Wamsley, R., Seamons, K.E., Smith, B.: Advanced client/server authentication in TLS. In: Network and Distributed System Security Symposium, pp. 203-214 (2002)
-
(2002)
Network and Distributed System Security Symposium
, pp. 203-214
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
19
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. USENIX Security (2003)
-
(2003)
USENIX Security
-
-
Crosby, S.A.1
Wallach, D.S.2
-
20
-
-
0035075103
-
A cost-based framework for analysis of denial of service networks
-
Meadows C.: A cost-based framework for analysis of denial of service networks. J. Comput. Secur. 9, 143-164 (2001)
-
(2001)
J. Comput. Secur.
, vol.9
, pp. 143-164
-
-
Meadows, C.1
-
21
-
-
0038684360
-
Dos-resistant authentication with client puzzles
-
In: Lecture Notes in Computer Science, Springer, Heidelberg
-
Aura, T., Nikander, P., Leiwo, J.: Dos-resistant authentication with client puzzles. In: Proceedings of the Cambridge Security Protocols Workshop 2000. Lecture Notes in Computer Science, Springer, Heidelberg (2000)
-
(2000)
Proceedings of the Cambridge Security Protocols Workshop 2000
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
25
-
-
0004078695
-
The KeyNote trust-management system
-
Keromytis, A.D.: The KeyNote trust-management system
-
-
-
Keromytis, A.D.1
-
26
-
-
84892446001
-
-
Crypto benchmarks. www.eskimo.com/∼weidai/benchmarks.html
-
Crypto Benchmarks
-
-
-
28
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
In: IEEE Computer Society Press, Washington, DC
-
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: Assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 2-14. IEEE Computer Society Press, Washington, DC (2000). www.hrl.il.ibm.com/TrustEstablishment/paper.pdf
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
|