-
2
-
-
3142653204
-
VOMS, An authorization system for virtual organizations
-
Feb
-
R. Alfieri, R. Cecchini, V. Ciaschini, L. Dell'agnello, A. Frohner, A. Gianoli, K. Lorentey, and F. Spataro, VOMS, "An authorization system for virtual organi-zations," in 1st European Across Grids Conference, Feb. 2003.
-
(2003)
1st European Across Grids Conference
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
Dell'agnello, L.4
Frohner, A.5
Gianoli, A.6
Lorentey, K.7
Spataro, F.8
-
4
-
-
84874967939
-
Kerberos Protocol: an Overview
-
Distributed Systems, Italy Fall
-
C. Baliello, A. Basso, and C. D. Giusto, Kerberos Protocol: an Overview, Distributed Systems, Italy, Fall 2002.
-
(2002)
-
-
Baliello, C.1
Basso, A.2
Giusto, C.D.3
-
5
-
-
84958235938
-
Trust management for IPsec
-
M. Blaze, J. Ioannidis, and A. D. Keromytis, "Trust management for IPsec," ACM Transactions on Infor-mation and System Security (TISSEC), vol. 5, no. 2, pp. 95-118, 2002.
-
(2002)
ACM Transactions on Infor-mation and System Security (TISSEC)
, vol.5
, Issue.2
, pp. 95-118
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
6
-
-
0036755906
-
Inside SSL: Accelerating secure transactions
-
Sep/Oct
-
W. Chou, "Inside SSL: Accelerating secure transac-tions," IEEE, IT Professional, vol. 4, no. 5, pp. 37-41, Sep./Oct. 2002.
-
(2002)
IEE IT Professional
, vol.4
, Issue.5
, pp. 37-41
-
-
Chou, W.1
-
7
-
-
84874959559
-
-
SANS Institute, as part of the Information Security Reading Room
-
D. Clark, Vulnerability's of IPSEC, SANS Institute, as part of the Information Security Reading Room, Mar. 14, 2002.
-
(2002)
Vulnerability's of IPSEC
-
-
Clark, D.1
-
8
-
-
2442505779
-
Au-tomatic verification of the TLS handshake protocol
-
G. Diaz, F. Cuartero, V. Valero, and F. Pelayo, "Au-tomatic verification of the TLS handshake protocol," in Proceedings of the 2004 ACM symposium on Ap-plied computing, pp. 789-794, 2004.
-
(2004)
Proceedings of the 2004 ACM symposium on Applied computing
, pp. 789-794
-
-
Diaz, G.1
Cuartero, F.2
Valero, V.3
Pelayo, F.4
-
14
-
-
0003505824
-
-
Digital Press, Bedford, MA
-
H. M. Levy, Capability-Based Computer Sys-tems, Digital Press, Bedford, MA, 1984. (http://www.cs.washington.edu/homes/levy/capabook/)
-
(1984)
Capability-Based Computer Systems
-
-
Levy, H.M.1
-
15
-
-
84874975343
-
-
Jan.mail@heinz.at, Dec. 2001-Jan
-
H. Moser, S/MIME, Dec. 2001-Jan. 2002, mail@heinz.at
-
(2002)
S/MIME
-
-
Moser, H.1
-
16
-
-
84874960044
-
-
Nortel Networks, Alteon 8661, SSL
-
Nortel Networks, Alteon 8661 SSL Acceler-ation Module for the Passport 8600, 2003. (http://www.nortelnetworks.com)
-
(2003)
Acceler-ation Module for the Passport 8600
-
-
-
17
-
-
84887853842
-
A community authorization ser-vice for group collaboration," in
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke, "A community authorization ser-vice for group collaboration," in Proceedings of the IEEE 3rd International Workshop on Poli-cies for Distributed Systems and Networks, 2002. (http://www.globus.org/research/papers.html#CAS-2002)
-
(2002)
Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Network
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
19
-
-
0036957308
-
Secur-ing wireless Data: System architecture challenges
-
Oct
-
A. Raghunathan, N. Potlapally, and S. Ravi, "Secur-ing wireless Data: System architecture challenges," in Proceedings of the 15th international symposium on System Synthesis (ISSS'02), pp. 195-200, Oct. 2002.
-
(2002)
Proceedings of the 15th international symposium on System Synthesis (ISSS'02)
, pp. 195-200
-
-
Raghunathan, A.1
Potlapally, N.2
Ravi, S.3
-
20
-
-
0036055207
-
System design methodologies for a wireless security processing platform,"
-
Jun
-
S. Ravi, A. Raghunathan, N. Potlapally, and M. Sankaradass, "System design methodologies for a wireless security processing platform," in 39th Design Automation Conference (DAC'02), pp. 777, Jun. 2002.
-
(2002)
39th Design Automation Conference (DAC'02)
, pp. 777
-
-
Ravi, S.1
Raghunathan, A.2
Potlapally, N.3
Sankaradass, M.4
-
22
-
-
84874952040
-
-
R.S.A., RSA., BSAFE, RC2, RC4, RC5, and MD5 are trademarks or registered trademarks of, RSA., Data Security, Inc
-
RSA, RSA BSAFE, RC2, RC4, RC5, and MD5 are trademarks or registered trademarks of RSA Data Security, Inc., 1999.
-
(1999)
-
-
-
23
-
-
84937538476
-
Improving SSL hand-shake performance via batching
-
Lecture Notes in Com-puter Science, Springer-Verlag 2020 Apr
-
H. Shacham and D. Boneh, "Improving SSL hand-shake performance via batching." in proceedings of the RSA Conference 2001, Lecture Notes in Com-puter Science, Vol. 2020, Springer-Verlag, pp. 28-43,Apr. 2001.
-
(2001)
proceedings of the RSA Conference 2001
, pp. 28-43
-
-
Shacham, H.1
Boneh, D.2
-
24
-
-
84861240734
-
Client Side Caching for TLS
-
H. Shacham, D. Boneh, and E. Rescorla, "Client Side Caching for TLS," in Proceedings of the Sym-posium on Network and Distributed System Security (SNDSS'02), pp. 195-202, 2002.
-
(2002)
Proceedings of the Sym-posium on Network and Distributed System Security (SNDSS'02)
, pp. 195-202
-
-
Shacham, H.1
Boneh, D.2
Rescorla, E.3
-
27
-
-
2942654406
-
Certificate-based authorization policy in a PKI en-vironment
-
Nov
-
M. R. Thompson, A. Essiari, and S. Mudumbai, "Certificate-based authorization policy in a PKI en-vironment," ACM Transactions on Information and System Security, vol. 6, no. 4, pp. 566-588, Nov. 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.R.1
Essiari, A.2
Mudumbai, S.3
-
28
-
-
0004001001
-
-
IETF draft
-
S. Tuecke, D. Engert, I. Foster, V.Welch, M. Thomp-son, L. Pearlman, and C. Kesselman, Internet X.509 Public Key Infrastructure Proxy Certificate Pro-file, IETF draft, 2002. (http://ww.ietf.org/internet-drafts/draft-ietf-pkix-proxy-03.txt)
-
(2002)
Internet X.509 Public Key Infrastructure Proxy Certificate Profile
-
-
Tuecke, S.1
Engert, D.2
Foster, I.3
Welch, V.4
Thomp-son, M.5
Pearlman, L.6
Kesselman, C.7
|