-
4
-
-
0024135278
-
The personal model of data: Towards a privacy-oriented information system
-
Biskup J, Brüggemann HH. The personal model of data: towards a privacy-oriented information system. Computers and Security 1988;7.
-
(1988)
Computers and Security
, pp. 7
-
-
Biskup, J.1
Brüggemann, H.H.2
-
5
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
MITRE Corp. Bedford, Mass
-
Bell DE, LaPadula U. Secure computer system: unified exposition and multics interpretation. Technical Report MTR-2997. MITRE Corp. Bedford, Mass; 1976.
-
(1976)
Technical Report
, vol.MTR-2997
-
-
Bell, D.E.1
LaPadula, U.2
-
9
-
-
84945298985
-
A new design of privilege management infrastructure for organizations using outsourced PKI
-
Lecture notes in computer science. Springer-Verlag; September
-
Dawson E, Lopez J, Montenegro A, Okamoto E. A new design of privilege management infrastructure for organizations using outsourced PKI. In: Fifth international conference on information security (ISC'02). Lecture notes in computer science, vol. 2433. Springer-Verlag; September 2002. p. 136-49.
-
(2002)
Fifth International Conference on Information Security (ISC'02)
, vol.2433
, pp. 136-149
-
-
Dawson, E.1
Lopez, J.2
Montenegro, A.3
Okamoto, E.4
-
13
-
-
1942521913
-
SPKI requirements
-
Network Working Group, Internet Engineering Task Force; September
-
Ellison C. SPKI requirements. Request for Comments 2692, Network Working Group, Internet Engineering Task Force; September 1999.
-
(1999)
Request for Comments 2692
-
-
Ellison, C.1
-
14
-
-
0003358457
-
SPKI certificate theory
-
Network Working Group, Internet Engineering Task Force; September
-
Ellison C, Frantz B, Lampson B, Rivest R, Thomas B, Ylonen T. SPKI certificate theory. Request for Comments 2693, Network Working Group, Internet Engineering Task Force; September 1999.
-
(1999)
Request for Comments 2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
15
-
-
0038150613
-
An Internet attribute certificate profile for authorization
-
Network Working Group, Internet Engineering Task Force; April
-
Farrell S, Housley R. An Internet attribute certificate profile for authorization. Request for Comments 3281, Network Working Group, Internet Engineering Task Force; April 2002.
-
(2002)
Request for Comments 3281
-
-
Farrell, S.1
Housley, R.2
-
18
-
-
0010307926
-
-
Digital Commerce Society of Boston; November
-
Geer D. Risk management is where the money is. Digital Commerce Society of Boston; November 1998. 〈http:// catless.ncl.ac.uk/Risks/20.06. html#subj1〉.
-
(1998)
Risk Management Is Where the Money Is
-
-
Geer, D.1
-
21
-
-
0003308762
-
Internet X.509.public key infrastructure certificate and CRL profile
-
Network Working Group, Internet Engineering Task Force; January
-
Housley R, Ford W, Polk W, Solo D. Internet X.509.public key infrastructure certificate and CRL profile. Request for Comments 2459, Network Working Group, Internet Engineering Task Force; January 1999.
-
(1999)
Request for Comments 2459
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
23
-
-
50849117865
-
Information technology. Open systems interconnection
-
ITU-T Recommendation X.509. June
-
ITU-T Recommendation X.509. Information technology. Open systems interconnection. The directory: authentication framework; June 1997.
-
(1997)
The Directory: Authentication Framework
-
-
-
24
-
-
8344227099
-
Information technology. Open systems interconnection
-
ITU-T Recommendation X.509. March
-
ITU-T Recommendation X.509. Information technology. Open systems interconnection. The directory: public-key and attribute certificate frameworks; March 2000.
-
(2000)
The Directory: Public-key and Attribute Certificate Frameworks
-
-
-
25
-
-
0003237987
-
The Kerberos network authentication service (V5)
-
Network Working Group, Internet Engineering Task Force; September
-
Kohl J, Neuman C. The Kerberos network authentication service (V5). Request for Comments 1510, Network Working Group, Internet Engineering Task Force; September 1993.
-
(1993)
Request for Comments 1510
-
-
Kohl, J.1
Neuman, C.2
-
26
-
-
0033719386
-
Risks of the passport single signon protocol
-
Kormann DP, Rubin AD. Risks of the passport single signon protocol. Computer Networks 2000;33:51-8.
-
(2000)
Computer Networks
, vol.33
, pp. 51-58
-
-
Kormann, D.P.1
Rubin, A.D.2
-
32
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
Needham RM, Schroeder MD. Using encryption for authentication in large networks of computers. Communications of the ACM December 1978;21:993-9.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
36
-
-
0041848577
-
Microsoft .NET Passport: A security analysis
-
July
-
Oppliger R. Microsoft .NET Passport: a security analysis. IEEE Computer July 2003;36(7):29-35.
-
(2003)
IEEE Computer
, vol.36
, Issue.7
, pp. 29-35
-
-
Oppliger, R.1
-
38
-
-
0003724905
-
Information systems security: Scope, state-of-the-art, and evaluation of techniques
-
Pernul G. Information systems security: scope, state-of-the-art, and evaluation of techniques. International Journal of Information Management 1995;15(3):242-56.
-
(1995)
International Journal of Information Management
, vol.15
, Issue.3
, pp. 242-256
-
-
Pernul, G.1
-
40
-
-
0030086382
-
Role-based access control models
-
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. IEEE Computer 1996;29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
42
-
-
0742292799
-
Internet security glossary
-
Network Working Group, Internet Engineering Task Force; May
-
Shirey R. Internet security glossary. Request for Comments 2828, Network Working Group, Internet Engineering Task Force; May 2000.
-
(2000)
Request for Comments 2828
-
-
Shirey, R.1
|