-
1
-
-
0031637195
-
On SDSI’s linked local name spaces
-
Oct
-
M. Abadi. On SDSI’s linked local name spaces. Journal of Computer Security, 6(1–2):3–21, Oct. 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1–2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
Sept
-
M. Abadi, M. Burrows, B. Lampson, and G. D. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706–734, Sept. 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G. D.4
-
3
-
-
0027809739
-
Authentication in the Taos Operating System
-
Dec
-
M. Abadi, E. Wobber, M. Burrows, and B. Lampson. Authentication in the Taos Operating System. In Proceedings of the 14th ACM Symposium on Operating System Principles, pages 256–269, Dec. 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating System Principles
, pp. 256-269
-
-
Abadi, M.1
Wobber, E.2
Burrows, M.3
Lampson, B.4
-
7
-
-
33750236737
-
-
Technical Report CMU-CyLab-06-002, Carnegie Mellon University, Feb
-
L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CyLab-06-002, Carnegie Mellon University, Feb 2006.
-
(2006)
Consumable credentials in logic-based access control
-
-
Bauer, L.1
Bowers, K. D.2
Pfenning, F.3
Reiter, M. K.4
-
8
-
-
33645995393
-
Device-enabled authorization in the Grey system
-
Sept
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. In Proceedings of the 8th Information Security Conference, pages 431–445, Sept. 2005.
-
(2005)
Proceedings of the 8th Information Security Conference
, pp. 431-445
-
-
Bauer, L.1
Garriss, S.2
McCune, J. M.3
Reiter, M. K.4
Rouse, J.5
Rutenbar, P.6
-
13
-
-
0033731024
-
Design, implementation, and deployment of the iKP secure electronic payment system
-
Apr
-
M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. V. Herreweghen, and M. Waidner. Design, implementation, and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications, 18(4):611–627, Apr 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 611-627
-
-
Bellare, M.1
Garay, J.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Herreweghen, E. V.8
Waidner, M.9
-
14
-
-
0025246897
-
A fair protocol for signing contracts
-
M. Ben-Or, O. Goldreich, S. Micali, and R. L. Rivest. A fair protocol for signing contracts. IEEE Transactions on Information Theory, 36(1):40–46, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R. L.4
-
15
-
-
0004078695
-
-
Request For Comments (RFC) 2704, Sept
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The KeyNote trust-management system, version 2. Request For Comments (RFC) 2704, Sept. 1999.
-
(1999)
The KeyNote trust-management system, version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A. D.4
-
16
-
-
0026383119
-
Non-interactive zero-knowledge
-
M. Blum, A. DeSantis, S. Micali, and G. Persiano. Non-interactive zero-knowledge. SIAM Journal of Computing, 20(6):1084–1118, 1991.
-
(1991)
SIAM Journal of Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
DeSantis, A.2
Micali, S.3
Persiano, G.4
-
18
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18–36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
19
-
-
84870841140
-
-
Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology, University of Twente
-
J. G. Cederquist, R. J. Corin, M. A. C. Dekker, S. Etalle, J. I. den Hartog, and G. Lenzini. The audit logic: Policy compliance in distributed systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology, University of Twente, 2006.
-
(2006)
The audit logic: Policy compliance in distributed systems
-
-
Cederquist, J. G.1
Corin, R. J.2
Dekker, M. A. C.3
Etalle, S.4
den Hartog, J. I.5
Lenzini, G.6
-
23
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030–1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
25
-
-
84929273746
-
Untraceable electronic cash
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology, Proceedings of Crypto’88, pages 319–327, 1990.
-
(1990)
Advances in Cryptology, Proceedings of Crypto’88
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
26
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. E. Clarke, J.-E. Elien, C. M. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285–322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D. E.1
Elien, J.-E.2
Ellison, C. M.3
Fredette, M.4
Morcos, A.5
Rivest, R. L.6
-
27
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory, 31:465–472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 465-472
-
-
ElGamal, T.1
-
28
-
-
84957060126
-
Abuse-free optimistic contract signing
-
J. A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Advances in Cryptology, Proceedings of Crypto’99, pages 449–466, 1999.
-
(1999)
Advances in Cryptology, Proceedings of Crypto’99
, pp. 449-466
-
-
Garay, J. A.1
Jakobsson, M.2
MacKenzie, P.3
-
30
-
-
33750280592
-
A linear logic of authorization and knowledge
-
Sept
-
D. Garg, L. Bauer, K. D. Bowers, F. Pfenning, and M. K. Reiter. A linear logic of authorization and knowledge. In Proceedings of the 11th European Symposium on Research in Computer Security, pages 297–312, Sept. 2006.
-
(2006)
Proceedings of the 11th European Symposium on Research in Computer Security
, pp. 297-312
-
-
Garg, D.1
Bauer, L.2
Bowers, K. D.3
Pfenning, F.4
Reiter, M. K.5
-
38
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Nov
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265–310, Nov. 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
39
-
-
0041524661
-
Delegation logic: a logic-based approach to distributed authorization
-
Feb
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: a logic-based approach to distributed authorization. ACM Transactions on Information and Systems Security, 6(1):128–171, Feb. 2003.
-
(2003)
ACM Transactions on Information and Systems Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B. N.2
Feigenbaum, J.3
-
42
-
-
33744908423
-
Monadic concurrent linear logic programming
-
July
-
P. López, F. Pfenning, J. Polakow, and K. Watkins. Monadic concurrent linear logic programming. In Proceedings of the 7th International Symposium on Principles and Practice of Declarative Programming, pages 35–46, July 2005.
-
(2005)
Proceedings of the 7th International Symposium on Principles and Practice of Declarative Programming
, pp. 35-46
-
-
López, P.1
Pfenning, F.2
Polakow, J.3
Watkins, K.4
|