-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Language Systems, 15 (4):706-734, 1993.
-
(1993)
ACM Transactions on Programming Language Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
4
-
-
0027809739
-
Authentication in the Taos operating system
-
Grove Park Inn and Country Club, Asheville, NC, ACM Press
-
M. Abadi, E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos operating system. In ACM Symposium on Operating System Principles, pages 256-269, The Grove Park Inn and Country Club, Asheville, NC, 1993. ACM Press.
-
(1993)
ACM Symposium on Operating System Principles
, pp. 256-269
-
-
Abadi, M.1
Wobber, E.2
Burrows, M.3
Lampson, B.4
-
5
-
-
77952345506
-
-
Akamai
-
Akamai. http://www.akamai.com.
-
-
-
-
10
-
-
33144455395
-
A proof-carrying authorization system
-
Department of Computer Science, Princeton University, Apr
-
L. Bauer, M. A. Schneider, and E. W. Felten. A proof-carrying authorization system. Technical Report CS-TR-638-01, Department of Computer Science, Princeton University, Apr. 2001.
-
(2001)
Technical Report CS-TR-638-01
-
-
Bauer, L.1
Schneider, M.A.2
Felten, E.W.3
-
11
-
-
85084162149
-
A general and flexible access-control system for the Web
-
San Francisco, CA, Aug
-
L. Bauer, M. A. Schneider, and E. W. Felten. A general and flexible access-control system for the Web. In Proceedings of the 11th USENIX Security Symposium, pages 93-108, San Francisco, CA, Aug. 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 93-108
-
-
Bauer, L.1
Schneider, M.A.2
Felten, E.W.3
-
14
-
-
84910666999
-
Active certificates: A framework for delegation
-
Internet Society
-
N. Borisov and E. A. Brewer. Active certificates: A framework for delegation. In NDSS. The Internet Society, 2002.
-
(2002)
NDSS
-
-
Borisov, N.1
Brewer, E.A.2
-
15
-
-
80052494019
-
Consumable credentials in linear-logic-based access-control systems
-
Feb
-
K. D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M. K. Reiter. Consumable credentials in linear-logic-based access-control systems. In Network and Distributed System Security Symposium, pages 143-157, Feb. 2007.
-
(2007)
Network and Distributed System Security Symposium
, pp. 143-157
-
-
Bowers, K.D.1
Bauer, L.2
Garg, D.3
Pfenning, F.4
Reiter, M.K.5
-
22
-
-
0004035649
-
-
draft-ietf-tls-rfc2246-bis-02.txt, Network Working Group, October
-
T. Dierks and E. Rescorla. The TLS protocol version 1.1. draft-ietf-tls-rfc2246-bis-02.txt, Network Working Group, October 2002.
-
(2002)
The TLS Protocol Version 1.1
-
-
Dierks, T.1
Rescorla, E.2
-
25
-
-
0003358457
-
SPKI certificate theory
-
Experimental, Sept
-
C. Ellison et al. SPKI certificate theory. RFC 2693 (Experimental), Sept. 1999.
-
(1999)
RFC 2693
-
-
Ellison, C.1
-
26
-
-
0042349623
-
A trusted open platform
-
P. England, B. Lampson, J. Manferdelli, M. Peinado, and B. Willman. A trusted open platform. Computer, 36 (7):55-62, 2003.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 55-62
-
-
England, P.1
Lampson, B.2
Manferdelli, J.3
Peinado, M.4
Willman, B.5
-
27
-
-
84958619373
-
FIPS 180-1
-
U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. Secure Hash Standard. U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
28
-
-
0003508562
-
-
FIPS 186-2, U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, January
-
FIPS 186-2. Digital Signature Standard (DSS). U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, January 2000.
-
(2000)
Digital Signature Standard (DSS)
-
-
-
29
-
-
70449696425
-
VXA: A virtual architecture for durable compressed archives
-
San Francisco, California, December
-
B. Ford. VXA: A virtual architecture for durable compressed archives. In 4th USENIX Conference on File and Storage Technologies (FAST '05), San Francisco, California, December 2005.
-
(2005)
4th USENIX Conference on File and Storage Technologies (FAST '05)
-
-
Ford, B.1
-
30
-
-
85076769385
-
Persistent personal names for globally connected mobile devices
-
Seattle, Washington, November
-
B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent personal names for globally connected mobile devices. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI '06), Seattle, Washington, November 2006.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI '06)
-
-
Ford, B.1
Strauss, J.2
Lesniewski-Laas, C.3
Rhea, S.4
Kaashoek, F.5
Morris, R.6
-
31
-
-
33750280592
-
A linear logic of authorization and knowledge
-
of Lecture Notes in Computer Science, Sept
-
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. A linear logic of authorization and knowledge. In Computer Security-ESORICS 2006:11th European Symposium on Research in Computer Security, volume 4189 of Lecture Notes in Computer Science, pages 297-312, Sept. 2006.
-
(2006)
Computer Security-ESORICS 2006:11th European Symposium on Research in Computer Security
, vol.4189
, pp. 297-312
-
-
Garg, D.1
Bauer, L.2
Bowers, K.D.3
Pfenning, F.4
Reiter, M.K.5
-
32
-
-
0016038540
-
Codes which detect deception
-
E. Gilbert, F. MacWilliams, and N. Sloane. Codes which detect deception. Bell System Technical Journal, 53 (3):405-424, 1974.
-
(1974)
Bell System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.1
MacWilliams, F.2
Sloane, N.3
-
36
-
-
0242278032
-
Information-theoretic cryptography
-
U. Maurer. Information-theoretic cryptography. Advances in Cryptology, 99:47-64.
-
Advances in Cryptology
, vol.99
, pp. 47-64
-
-
Maurer, U.1
-
37
-
-
0042352260
-
Separating key management from file system security
-
Kiawah Island, South Carolina, December
-
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In 17th ACM Symposium on Operating Systems Principles (SOSP '99), pages 124-139, Kiawah Island, South Carolina, December 1999.
-
(1999)
17th ACM Symposium on Operating Systems Principles (SOSP '99)
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
38
-
-
0000838441
-
Use of elliptic curves in cryptography
-
V. Miller. Use of elliptic curves in cryptography. In CRYPTO, 1985.
-
(1985)
CRYPTO
-
-
Miller, V.1
-
40
-
-
49249101269
-
Efficient representation and validation of proofs
-
G. C. Necula and P. Lee. Efficient representation and validation of proofs. In IEEE Logic in Computer Science, pages 93-104, 1998.
-
(1998)
IEEE Logic in Computer Science
, pp. 93-104
-
-
Necula, G.C.1
Lee, P.2
-
41
-
-
77952370337
-
An ipv6 prefix for overlay routable cryptographic hash identifiers (ORCHID)
-
P. Nikander and J. Laganier. An IPv6 prefix for overlay routable cryptographic hash identifiers (ORCHID). RFC 4843, 2007.
-
(2007)
RFC 4843
-
-
Nikander, P.1
Laganier, J.2
-
42
-
-
85029583595
-
Isabelle-91
-
D. Kapur, editor, Saratoga Springs, NY, Springer-Verlag LNAI 607
-
T. Nipkow and L. C. Paulson. Isabelle-91. In D. Kapur, editor, 11th International Conference on Automated Deduction, pages 673-676, Saratoga Springs, NY, 1992. Springer-Verlag LNAI 607.
-
(1992)
11th International Conference on Automated Deduction
, pp. 673-676
-
-
Nipkow, T.1
Paulson, L.C.2
-
43
-
-
77952410372
-
-
OpenID
-
OpenID. http://openid.net/.
-
-
-
-
44
-
-
0002474842
-
Logic programming in the LF logical framework
-
G. Huet and G. Plotkin, editors, Cambridge University Press
-
F. Pfenning. Logic programming in the LF logical framework. In G. Huet and G. Plotkin, editors, Logical Frameworks, pages 149-181. Cambridge University Press, 1991.
-
(1991)
Logical Frameworks
, pp. 149-181
-
-
Pfenning, F.1
-
45
-
-
77952359057
-
-
PlanetLab
-
PlanetLab. http://www.planet-lab.org.
-
-
-
-
46
-
-
0003821858
-
HTTP over TLS
-
Informational, May
-
E. Rescorla. HTTP Over TLS. RFC 2818 (Informational), May 2000.
-
(2000)
RFC 2818
-
-
Rescorla, E.1
-
49
-
-
0012408597
-
SDSI - A simple distributed security infrastructure
-
Presented at
-
R. L. Rivest and B. Lampson. SDSI - a simple distributed security infrastructure. Presented at CRYPTO'96 Rumpsession, 1996.
-
(1996)
CRYPTO'96 Rumpsession
-
-
Rivest, R.L.1
Lampson, B.2
-
50
-
-
77952371840
-
-
RSA SecurID token
-
RSA SecurID token. http://www.rsa.com.
-
-
-
-
51
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63 (9):1278-1308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
52
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, 1984.
-
(1984)
CRYPTO
-
-
Shamir, A.1
-
53
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In USENIX Winter, pages 191-202, 1988.
-
(1988)
USENIX Winter
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
54
-
-
0000410707
-
Universal hashing and authentication codes
-
D. R. Stinson. Universal hashing and authentication codes. Design, Codes, and Cryptography, 4 (4):369-380, 1994.
-
(1994)
Design, Codes, and Cryptography
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.R.1
-
56
-
-
33646754186
-
Finding collisions in the full SHA-1
-
X. Wang, Y. Yin, and H. Yu. Finding collisions in the full SHA-1. In CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
-
57
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|