메뉴 건너뛰기




Volumn , Issue , 2007, Pages 432-444

Alpaca: Extensible authorization for distributed services

Author keywords

Authorization; Cryptography; Logic; Security; Theorem proving

Indexed keywords

AUTHENTICATION AND AUTHORIZATION; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC PRIMITIVES; DISTRIBUTED SERVICE; DOMAIN SPECIFIC LANGUAGES; INTER-ORGANIZATION; LOGICAL AXIOMS; MODULAR APPROACH; NAMESPACES; PLUG-INS; PUBLIC-KEY INFRASTRUCTURE; SECURITY THEOREM;

EID: 77952364800     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315299     Document Type: Conference Paper
Times cited : (25)

References (57)
  • 4
    • 0027809739 scopus 로고
    • Authentication in the Taos operating system
    • Grove Park Inn and Country Club, Asheville, NC, ACM Press
    • M. Abadi, E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos operating system. In ACM Symposium on Operating System Principles, pages 256-269, The Grove Park Inn and Country Club, Asheville, NC, 1993. ACM Press.
    • (1993) ACM Symposium on Operating System Principles , pp. 256-269
    • Abadi, M.1    Wobber, E.2    Burrows, M.3    Lampson, B.4
  • 5
    • 77952345506 scopus 로고    scopus 로고
    • Akamai
    • Akamai. http://www.akamai.com.
  • 10
    • 33144455395 scopus 로고    scopus 로고
    • A proof-carrying authorization system
    • Department of Computer Science, Princeton University, Apr
    • L. Bauer, M. A. Schneider, and E. W. Felten. A proof-carrying authorization system. Technical Report CS-TR-638-01, Department of Computer Science, Princeton University, Apr. 2001.
    • (2001) Technical Report CS-TR-638-01
    • Bauer, L.1    Schneider, M.A.2    Felten, E.W.3
  • 14
    • 84910666999 scopus 로고    scopus 로고
    • Active certificates: A framework for delegation
    • Internet Society
    • N. Borisov and E. A. Brewer. Active certificates: A framework for delegation. In NDSS. The Internet Society, 2002.
    • (2002) NDSS
    • Borisov, N.1    Brewer, E.A.2
  • 22
    • 0004035649 scopus 로고    scopus 로고
    • draft-ietf-tls-rfc2246-bis-02.txt, Network Working Group, October
    • T. Dierks and E. Rescorla. The TLS protocol version 1.1. draft-ietf-tls-rfc2246-bis-02.txt, Network Working Group, October 2002.
    • (2002) The TLS Protocol Version 1.1
    • Dierks, T.1    Rescorla, E.2
  • 25
    • 0003358457 scopus 로고    scopus 로고
    • SPKI certificate theory
    • Experimental, Sept
    • C. Ellison et al. SPKI certificate theory. RFC 2693 (Experimental), Sept. 1999.
    • (1999) RFC 2693
    • Ellison, C.1
  • 27
    • 84958619373 scopus 로고
    • FIPS 180-1
    • U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, April
    • FIPS 180-1. Secure Hash Standard. U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, April 1995.
    • (1995) Secure Hash Standard
  • 28
    • 0003508562 scopus 로고    scopus 로고
    • FIPS 186-2, U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, January
    • FIPS 186-2. Digital Signature Standard (DSS). U. S. Department of Commerce/N. I. S. T., National Technical Information Service, Springfield, VA, January 2000.
    • (2000) Digital Signature Standard (DSS)
  • 29
    • 70449696425 scopus 로고    scopus 로고
    • VXA: A virtual architecture for durable compressed archives
    • San Francisco, California, December
    • B. Ford. VXA: A virtual architecture for durable compressed archives. In 4th USENIX Conference on File and Storage Technologies (FAST '05), San Francisco, California, December 2005.
    • (2005) 4th USENIX Conference on File and Storage Technologies (FAST '05)
    • Ford, B.1
  • 36
    • 0242278032 scopus 로고    scopus 로고
    • Information-theoretic cryptography
    • U. Maurer. Information-theoretic cryptography. Advances in Cryptology, 99:47-64.
    • Advances in Cryptology , vol.99 , pp. 47-64
    • Maurer, U.1
  • 38
    • 0000838441 scopus 로고
    • Use of elliptic curves in cryptography
    • V. Miller. Use of elliptic curves in cryptography. In CRYPTO, 1985.
    • (1985) CRYPTO
    • Miller, V.1
  • 40
    • 49249101269 scopus 로고    scopus 로고
    • Efficient representation and validation of proofs
    • G. C. Necula and P. Lee. Efficient representation and validation of proofs. In IEEE Logic in Computer Science, pages 93-104, 1998.
    • (1998) IEEE Logic in Computer Science , pp. 93-104
    • Necula, G.C.1    Lee, P.2
  • 41
    • 77952370337 scopus 로고    scopus 로고
    • An ipv6 prefix for overlay routable cryptographic hash identifiers (ORCHID)
    • P. Nikander and J. Laganier. An IPv6 prefix for overlay routable cryptographic hash identifiers (ORCHID). RFC 4843, 2007.
    • (2007) RFC 4843
    • Nikander, P.1    Laganier, J.2
  • 43
    • 77952410372 scopus 로고    scopus 로고
    • OpenID
    • OpenID. http://openid.net/.
  • 44
    • 0002474842 scopus 로고
    • Logic programming in the LF logical framework
    • G. Huet and G. Plotkin, editors, Cambridge University Press
    • F. Pfenning. Logic programming in the LF logical framework. In G. Huet and G. Plotkin, editors, Logical Frameworks, pages 149-181. Cambridge University Press, 1991.
    • (1991) Logical Frameworks , pp. 149-181
    • Pfenning, F.1
  • 45
    • 77952359057 scopus 로고    scopus 로고
    • PlanetLab
    • PlanetLab. http://www.planet-lab.org.
  • 46
    • 0003821858 scopus 로고    scopus 로고
    • HTTP over TLS
    • Informational, May
    • E. Rescorla. HTTP Over TLS. RFC 2818 (Informational), May 2000.
    • (2000) RFC 2818
    • Rescorla, E.1
  • 49
    • 0012408597 scopus 로고    scopus 로고
    • SDSI - A simple distributed security infrastructure
    • Presented at
    • R. L. Rivest and B. Lampson. SDSI - a simple distributed security infrastructure. Presented at CRYPTO'96 Rumpsession, 1996.
    • (1996) CRYPTO'96 Rumpsession
    • Rivest, R.L.1    Lampson, B.2
  • 50
    • 77952371840 scopus 로고    scopus 로고
    • RSA SecurID token
    • RSA SecurID token. http://www.rsa.com.
  • 51
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sept
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63 (9):1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 52
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, 1984.
    • (1984) CRYPTO
    • Shamir, A.1
  • 53
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In USENIX Winter, pages 191-202, 1988.
    • (1988) USENIX Winter , pp. 191-202
    • Steiner, J.G.1    Neuman, B.C.2    Schiller, J.I.3
  • 54
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • D. R. Stinson. Universal hashing and authentication codes. Design, Codes, and Cryptography, 4 (4):369-380, 1994.
    • (1994) Design, Codes, and Cryptography , vol.4 , Issue.4 , pp. 369-380
    • Stinson, D.R.1
  • 56
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • X. Wang, Y. Yin, and H. Yu. Finding collisions in the full SHA-1. In CRYPTO, 2005.
    • (2005) CRYPTO
    • Wang, X.1    Yin, Y.2    Yu, H.3
  • 57
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.