-
1
-
-
84956868429
-
Fast access control decisions from delegation certificate databases
-
Proceedings of 3rd Australasian Conference on Information Security and Privacy ACISP'98, Springer, July
-
T. Aura. Fast access control decisions from delegation certificate databases. In Proceedings of 3rd Australasian Conference on Information Security and Privacy ACISP'98, volume 1428 of Lecture Notes in Computer Science, pages 284-295. Springer, July 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1428
, pp. 284-295
-
-
Aura, T.1
-
2
-
-
0031641091
-
On the structure of delegation networks
-
MA USA, June IEEE Computer Society Press
-
T. Aura. On the structure of delegation networks. In Proc. 11th IEEE Computer Security Foundations Workshop, pages 14-26, MA USA, June 1998. IEEE Computer Society Press.
-
(1998)
Proc. 11th IEEE Computer Security Foundations Workshop
, pp. 14-26
-
-
Aura, T.1
-
7
-
-
35048868839
-
A Distributed Credential Management System for SPKI-Based Delegation Systems
-
O. Cánovas and A. F. Gómez. A Distributed Credential Management System for SPKI-Based Delegation Systems. In Proceedings of 1st Annual PKI Research Workshop, pages 65-76, 2002.
-
(2002)
Proceedings of 1st Annual PKI Research Workshop
, pp. 65-76
-
-
Cánovas, O.1
Gómez, A.F.2
-
8
-
-
0003593599
-
-
September Request For Comments (RFC) 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, September 1999. Request For Comments (RFC) 2693.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
13
-
-
34250197762
-
Access control infrastructure for digital objects
-
Proceedings of ICICS 2002, Springer
-
J. López, A. Maña, E. Pimentel, J. M. Troya, and M. I. Yagüe. Access control infrastructure for digital objects. In Proceedings of ICICS 2002, volume 2513 of Lecture Notes in Computer Science, pages 399-410. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 399-410
-
-
López, J.1
Maña, A.2
Pimentel, E.3
Troya, J.M.4
Yagüe, M.I.5
-
15
-
-
84947436665
-
Resolving conflicts in authorization delegations
-
Proceedings of ACISP 2002, Springer
-
C. Ruan and V. Varadharajan. Resolving conflicts in authorization delegations. In Proceedings of ACISP 2002, volume 2384 of Lecture Notes in Computer Science, pages 271-285. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 271-285
-
-
Ruan, C.1
Varadharajan, V.2
-
19
-
-
0002045898
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2), February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
21
-
-
85084164318
-
Certificate-Based Access Control for Widely Distributed Resources
-
August
-
M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, and A. Essiari. Certificate-Based Access Control for Widely Distributed Resources. In Proceedings of the 8th USENIX Security Symposium, pages 215-227, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 215-227
-
-
Thompson, M.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
-
22
-
-
0037855622
-
-
Request For Comments (RFC) 2904, August
-
J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege, and D. Spence. AAA Authorization Framework. Request For Comments (RFC) 2904, August 2000.
-
(2000)
AAA Authorization Framework
-
-
Vollbrecht, J.1
Calhoun, P.2
Farrell, S.3
Gommans, L.4
Gross, G.5
De Bruijn, B.6
De Laat, C.7
Holdrege, M.8
Spence, D.9
|