메뉴 건너뛰기




Volumn , Issue , 1999, Pages 340-348

Formalizing certificate management systems

Author keywords

CA (Certificate Authority); certificate; certificate management systems; formal methods; information security

Indexed keywords

CERTIFICATE; CERTIFICATE AUTHORITY; CERTIFICATE MANAGEMENT; DYNAMIC CHANGES; FORMAL SPECIFICATION; IN NETWORKS; SECURITY APPLICATION;

EID: 84890450560     PISSN: 15566463     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICON.1999.796196     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 1
    • 84890461765 scopus 로고    scopus 로고
    • C. C. E. Board. Draft version 0.6, March
    • C. C. E. Board. CCEB CMI Authentication Framework. Draft version 0.6, March 1999.
    • (1999) CCEB CMI Authentication Framework
  • 4
    • 84890531944 scopus 로고    scopus 로고
    • Proof tactics for a theory of state machines in a graphical environment
    • Proceedings of the 14th International Conference on Automated Deduction (CADE-14), Springer-Verlag
    • K. A. Eastaughffe, M. A. Ozols, and A. Cant. Proof tactics for a theory of state machines in a graphical environment. In Proceedings of the 14th International Conference on Automated Deduction (CADE-14), Lecture Notes in Artificial Intellegince, pages 366-379. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Artificial Intellegince , pp. 366-379
    • Eastaughffe, K.A.1    Ozols, M.A.2    Cant, A.3
  • 6
    • 0031632931 scopus 로고    scopus 로고
    • Creating security applications based on the global certificate management system
    • N. Kapidzic. Creating security applications based on the global certificate management system. Computers & Security, 17:507-515, 1998.
    • (1998) Computers & Security , vol.17 , pp. 507-515
    • Kapidzic, N.1
  • 9
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 10
    • 30244488333 scopus 로고
    • Organization of certification authorities in a global network
    • D. Trcek. Organization of certification authorities in a global network. Computer Security Journal, 10(1):72-81, 1994.
    • (1994) Computer Security Journal , vol.10 , Issue.1 , pp. 72-81
    • Trcek, D.1
  • 11
    • 84974750564 scopus 로고
    • Authorization in distributed systems: A new approach
    • T. Y. C. Woo and S. S. Lam. Authorization in distributed systems: A new approach. Journal of Computer Security, pages 107-136, 2(1993).
    • (1993) Journal of Computer Security , vol.2 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2
  • 12
    • 84890522620 scopus 로고    scopus 로고
    • version 2.0. Technical report, Trusted Computer Section, Information Technology Division, Defence Science and Technology Organisation, PO Box 1500, Salisbury, SA 5107, Australia
    • J. Yesberg, M. Ozols, and K. A. Eastaughffe. Interactive link formal policy and architecture version 2.0. Technical report, Trusted Computer Section, Information Technology Division, Defence Science and Technology Organisation, PO Box 1500, Salisbury, SA 5107, Australia, 1998.
    • (1998) Interactive Link Formal Policy and Architecture
    • Yesberg, J.1    Ozols, M.2    Eastaughffe, K.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.