-
1
-
-
0037479060
-
Language-Based Security
-
June
-
Kozen, Dexter, “Language-Based Security”, Computer Science Technical Report #TR99- 1751, Department of Computer Science, Cornell University, June 15, 1999, http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR99-1751
-
(1999)
Computer Science Technical Report #TR99- 1751, Department of Computer Science, Cornell University
, pp. 15
-
-
Kozen, D.1
-
2
-
-
84937411104
-
Flexible and Extensible Digital Object and Repository Architecture
-
Springer, draft at
-
Payette, Sandra and Carl Lagoze, “Flexible and Extensible Digital Object and Repository Architecture,” ECDL98, Lecture Notes in Computer Science, Vol. 1513, Springer, 1998, (draft at: http://www.cs.cornell.edu/payette/papers/ecdl98/fedora.html)
-
(1998)
ECDL98, Lecture Notes in Computer Science
, vol.1513
-
-
Payette, S.1
Lagoze, C.2
-
3
-
-
0012753476
-
Interoperability for Digital Objects and Repositories: The Cornell/CNRI Experiments
-
May
-
Payette, Sandra, Christophe Blanchi, Carl Lagoze, and Edward Overly, “Interoperability for Digital Objects and Repositories: The Cornell/CNRI Experiments,” D-Lib Magazine, May 1999. http://www.dlib.org/dlib/may99/payette/05payette.html
-
(1999)
D-Lib Magazine
-
-
Payette, S.1
Blanchi, C.2
Lagoze, C.3
Overly, E.4
-
4
-
-
0003970441
-
-
Computer Science Technical Report #TR98-1664, Department of Computer Science, Cornell University
-
Schneider, Fred B., “Enforceable Security Policies,” Computer Science Technical Report #TR98-1664, Department of Computer Science, Cornell University, July 24, 1999, http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR98-1664
-
(1999)
Enforceable Security Policies
, Issue.July
, pp. 24
-
-
Schneider, F.B.1
-
5
-
-
3042541926
-
SASI Enforcement of Security Policies: A Retrospective
-
Cornell University
-
Erlingsson, Ulfar and Fred B. Schneider, “SASI Enforcement of Security Policies: A Retrospective,” Computer Science Technical Report #TR99-1758, Department of Computer Science, Cornell University, July 19, 1999, http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR99-1758
-
(1999)
Computer Science Technical Report #TR99-1758, Department of Computer Science
, Issue.July
, pp. 19
-
-
Erlingsson, U.1
Schneider, F.B.2
-
6
-
-
70849087855
-
IRM Enforcement of Java Stack Inspection
-
February 19
-
Erlingsson, Ulfar and Fred B. Schneider, “IRM Enforcement of Java Stack Inspection,” Computer Science Technical Report #TR2000-1786, Department of Computer Science, Cornell University, February 19, 2000, http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR2000-1786.
-
(2000)
Computer Science Technical Report #TR2000-1786, Department of Computer Science, Cornell University
-
-
Erlingsson, U.1
Schneider, F.B.2
-
7
-
-
84937476033
-
-
XrML driving the standard, www.xrml.org
-
-
-
-
8
-
-
84937476034
-
Compliance Checking in the PolicyMaker Trust Management System
-
Blaze, Matt, Joan Feigenbaum, Martin Strauss, “Compliance Checking in the PolicyMaker Trust Management System”, ATT Labs, 1998, http://www.research.att.com/library/trs/TRs/98/98.3/98.3.2.body.ps.
-
(1998)
ATT Labs
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
9
-
-
84937476035
-
-
IBM Cryptolopes, http://www-4.ibm.com/software/security/cryptolope/
-
-
-
-
10
-
-
84937476036
-
-
PRISM Home Page, http://prism.cornell.edu
-
-
-
-
11
-
-
84937476037
-
-
SODA: Smart Objects, Dumb Archives, ECDL99, Lecture Notes in Computer Science, Springer
-
Nelson, M., Maly, K., Zubair, M., and Shen, S.N.T, SODA: Smart Objects, Dumb Archives, ECDL99, Lecture Notes in Computer Science, Springer, 1999, http://link.springer.de/link/service/series/0558/bibs/1696/16960453.htm
-
(1999)
-
-
Nelson, M.1
Maly, K.2
Zubair, M.3
Shen, S.4
-
12
-
-
84937476038
-
-
The KeyNote Trust Management System, http://www.crypto.com/trustmgt/kn.html
-
-
-
|