-
1
-
-
0004215976
-
-
Technical report, DEC Systems Research Center, February, Research Report 39
-
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Technical report, DEC Systems Research Center, February 1989. Research Report 39.
-
(1989)
A Logic of Authentication
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
0002863367
-
Valuation of trust in open networks
-
Brighton, UK, November
-
T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In ESORICS 94. Brighton, UK, November 1994.
-
(1994)
ESORICS 94
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
4
-
-
0003200464
-
An expert system framework for non-monotonic reasoning about probabilistic assumptions
-
L.N. Kanal and J.F. Lemmer, editors, North-Holland
-
M.S. Cohen. An expert system framework for non-monotonic reasoning about probabilistic assumptions. In L.N. Kanal and J.F. Lemmer, editors, Uncertainty in Artificial Intelligence. North-Holland, 1986.
-
(1986)
Uncertainty in Artificial Intelligence
-
-
Cohen, M.S.1
-
5
-
-
84957898800
-
-
The European Commission
-
EC. Information Technology Security Evaluation Criteria (ITSEC). The European Commission, 1992.
-
(1992)
-
-
-
7
-
-
84957898801
-
-
Evaluation Criteria for IT Security (Common Criteria), documents N-1401/1404. ISO/IEC JTC1/SC 27
-
ISO. Evaluation Criteria for IT Security (Common Criteria), documents N-1401/1404. ISO/IEC JTC1/SC 27, 1996.
-
(1996)
-
-
ISO1
-
8
-
-
84957898802
-
-
X.509, The Directory-Authentication Framework. International Telecommunications Union
-
ITU. X.509, The Directory-Authentication Framework. International Telecommunications Union, 1989.
-
(1989)
-
-
-
12
-
-
84974759626
-
The role of trust in information integrity protocols
-
G.J. Simmons and C. Meadows. The role of trust in information integrity protocols. Journal of Computer Security, 3(1):71-84, 1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 71-84
-
-
Simmons, G.J.1
Meadows, C.2
-
13
-
-
0002796093
-
On key distribution protocols for repeated authentication
-
October
-
Paul F. Syverson. On key distribution protocols for repeated authentication. Operating Systems Review, 27(4), October 1993.
-
(1993)
Operating Systems Review
, vol.27
, Issue.4
-
-
Syverson, P.F.1
-
14
-
-
84957898805
-
-
Trusted Computer System Evaluation Criteria (TCSEC). US Department of Defence
-
USDoD. Trusted Computer System Evaluation Criteria (TCSEC). US Department of Defence, 1985.
-
(1985)
-
-
-
16
-
-
84957898806
-
-
The Official PGP User’s Guide. MIT Press
-
P.R. Zimmermann. The Official PGP User’s Guide. MIT Press, 1995.
-
(1995)
-
-
Zimmermann, P.R.1
|