-
4
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
5
-
-
0035680371
-
Certificate chain discovery in SPKIISDSI
-
D. Clarke, J. Elien, C. Ellison, M. Fredette, A. Morcos and R. Rivest. Certificate chain discovery in SPKIISDSI. Computer Security, 9(4):285-322, 2001.
-
(2001)
Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.6
-
6
-
-
84904322518
-
-
SPKIISDSI certificates
-
C. Ellison. SPKIISDSI certificates. http://world.std.com/ -cme/html/spki.html, 2002.
-
(2002)
-
-
Ellison, C.1
-
7
-
-
0003993045
-
-
In J. Bradshaw (ed.), Software Agents. MIT Press, Cambridge, Massachusetts
-
T. Finin, Y. Labrou and J. Mayfield. KQML as an agent communication language. In J. Bradshaw (ed.), Software Agents. MIT Press, Cambridge, Massachusetts, 1997.
-
(1997)
KQML As An Agent Communication Language
-
-
Finin, T.1
Labrou, Y.2
Mayfield, J.3
-
8
-
-
84937580597
-
Relying party credentials framework
-
In D. Naccache (ed.), San Francisco, California
-
A. Herzberg and Y. Mass. Relying party credentials framework. In D. Naccache (ed.), Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference (LNCS 2020), pages 328-343, San Francisco, California, 2001.
-
(2001)
Topics In Cryptology - CT-RSA 2001, the Cryptographer's Track At RSA Conference (LNCS 2020)
, pp. 328-343
-
-
Herzberg, A.1
Mass, Y.2
-
11
-
-
0003700417
-
-
M.l. T. Project Athena. Technical Report, Cambridge, Massachusetts
-
S. Miller, B. Neuman, J. Schiller and J. Saltzer. Section E.2.1: Kerberos authentification and authorization system. M.l. T. Project Athena. Technical Report, Cambridge, Massachusetts, 1987.
-
(1987)
Section E.2.1: Kerberos Authentification and Authorization System
-
-
Miller, S.1
Neuman, B.2
Schiller, J.3
Saltzer, J.4
-
12
-
-
84904349995
-
-
Object Management Group
-
Object Management Group. The CORBA Security Specification. www. omg.org/cgi-bin/doc?formal/2002-03-11, 2002.
-
(2002)
The CORBA Security Specification
-
-
-
13
-
-
0037848141
-
Access control: Policies, models and mechanisms
-
In R. Focardi and R. Gorrieri (eds.), Springer, Berlin, Germany
-
P. Samarati and S. de Capitani di Vimercati. Access control: Policies, models and mechanisms. In R. Focardi and R. Gorrieri (eds.), Foundations of Security Analysis and Design (LNCS 2171), pages 137-196. Springer, Berlin, Germany, 2000.
-
(2000)
Foundations of Security Analysis and Design (LNCS 2171)
, pp. 137-196
-
-
Samarati, P.1
de Capitani di Vimercati, S.2
-
15
-
-
0037669985
-
Protecting privacy during on-line trust negotiation
-
San Francisco, California
-
K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child and J. Jacobsen. Protecting privacy during on-line trust negotiation. In Proceedings of the Second Workshop on Privacy Enhancing Technologies, San Francisco, California, 2002.
-
(2002)
In Proceedings of the Second Workshop On Privacy Enhancing Technologies
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobsen, J.6
-
17
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
Washington D.C
-
W. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson and A. Essiari. Certificate-based access control for widely distributed resources. In Proceedings of the 8th USENIX Security Symposium, Washington D.C., 1999.
-
(1999)
N Proceedings of the 8th USENIX Security Symposium
-
-
Thompson, W.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
|