-
1
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
November
-
Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
2
-
-
77952906332
-
Using Authority Certificates to Create Management Structures
-
Springer Verlag. In press
-
B.S. Firozabadi, M. Sergot, and O. Bandmann. Using Authority Certificates to Create Management Structures. In Proceeding of Security Protocols, 9th International Workshop, Cambridge, UK, April 2001. Springer Verlag. In press.
-
Proceeding of Security Protocols, 9th International Workshop, Cambridge, UK, April 2001
-
-
Firozabadi, B.S.1
Sergot, M.2
Bandmann, O.3
-
3
-
-
0003593599
-
-
IETF RFC 2693
-
C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI Certificate Theory. IETF RFC 2693, 1998.
-
(1998)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
4
-
-
0036376894
-
dRBAC:Distributed role-based access control for dynamic coalition environments
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC:Distributed role-based access control for dynamic coalition environments. In Proceedings of the 22nd International Conference on Distributed Computing Systems(ICDCS'02), 2002.
-
Proceedings of the 22nd International Conference on Distributed Computing Systems(ICDCS'02), 2002
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
5
-
-
84892711302
-
Framework for Role-Based Delegation Models
-
Ezedin Barka and Ravi Sandhu. Framework for Role-Based Delegation Models. In Pro-ceedings of 16th Annual Computer Security Application Conference, New Orleans, LA, December 11-15 2000, pages 168-176
-
Pro-ceedings of 16th Annual Computer Security Application Conference, New Orleans, LA, December 11-15 2000
, pp. 168-176
-
-
Barka, E.1
Sandhu, R.2
-
6
-
-
0012419393
-
-
Edited by Fran Berman, Geoffery Fox, Tony Hey, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England
-
Grid Computing - Making the Global Infrastructure a Reality, Edited by Fran Berman, Geoffery Fox, Tony Hey, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, 2003
-
(2003)
Grid Computing - Making the Global Infrastructure a Reality
-
-
-
7
-
-
0004078695
-
-
version 2. IETF RFC 2704, September
-
M. Blaze, J. Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote trust-management system, version 2. IETF RFC 2704, September 1999.
-
(1999)
The KeyNote Trust-management System
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
8
-
-
84982899264
-
The role of trust management in distributed systems
-
Secure Intternet Programming, Springer
-
M. Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The role of trust management in distributed systems. In Secure Intternet Programming, volume 1603 of Lec-ture Notes in Computer Science, pages 185-210. Springer, 1999.
-
(1999)
Lec-ture Notes in Computer Science
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
13
-
-
4143059136
-
Role-Based Cascaded Delegation
-
Roberto Tamassia, Danfeng Yao, William H. Winsborough, Role-Based Cascaded Delegation, SACMAT'04, June 2-4, 2004, Yorktown Heights, New York, USA.
-
SACMAT'04, June 2-4, 2004, Yorktown Heights, New York, USA
-
-
Tamassia, R.1
Yao, D.2
Winsborough, W.H.3
-
14
-
-
0030086382
-
Role-based access control models
-
Ravi Sandhu, Edward Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.L.3
Youman, C.E.4
-
18
-
-
0035790651
-
A Model of OASIS Role-Based Access Control and its Support for Active Security
-
W. Yao, K. Moody and J. Bacon, "A Model of OASIS Role-Based Access Control and its Support for Active Security", Proceedings Sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Chantilly, VA, USA, May 2001, pp 171-181.
-
Proceedings Sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Chantilly, VA, USA, May 2001
, pp. 171-181
-
-
Yao, W.1
Moody, K.2
Bacon, J.3
|