-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
September
-
M. Abadi, M. Burrows, B. Lampson, and G. D. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, September 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.D.4
-
2
-
-
0043232732
-
Users are not the enemy: Why users compromise computer computer security mechanisms and how to take remedial measures
-
December
-
A. Adams and M. A. Sasse. Users are not the enemy: Why users compromise computer computer security mechanisms and how to take remedial measures. Communications of the ACM, 42:40-46, December 1999.
-
(1999)
Communications of the ACM
, vol.42
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
85084162149
-
A general and flexible access-control system for the web
-
San Francisco, CA, August
-
L. Bauer, M. A. Schneider, and E. W. Felten. A general and flexible access-control system for the web. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Bauer, L.1
Schneider, M.A.2
Felten, E.W.3
-
4
-
-
0004078695
-
-
IETF - Network Working Group, The Internet Society, September. RFC 2704
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Key Note Trust-Management System Version 2. IETF - Network Working Group, The Internet Society, September 1999. RFC 2704.
-
(1999)
The Key Note Trust-Management System Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
7
-
-
0003286492
-
The TLS protocol version 1.0
-
The Internet Society, January. RFC 2246
-
T. Dierks and C. Allen. The TLS Protocol Version 1.0. IETF - Network Working Group, The Internet Society, January 1999. RFC 2246.
-
(1999)
IETF - Network Working Group
-
-
Dierks, T.1
Allen, C.2
-
8
-
-
0038675273
-
Using speakeasy for ad hoc peer-to-peer collaboration
-
New Orleans, LA, November
-
W. K. Edwards, M. W. Newman, J. Z. Sedivy, T. F. Smith, D. Balfanz, D. K. Smetters, H. C. Wong, and S. Izadi. Using speakeasy for ad hoc peer-to-peer collaboration. In Proceedings of ACM 2002 Conference on Computer Supported Cooperative Work (CSCW 2002), New Orleans, LA, November 2002.
-
(2002)
Proceedings of ACM 2002 Conference on Computer Supported Cooperative Work (CSCW 2002)
-
-
Edwards, W.K.1
Newman, M.W.2
Sedivy, J.Z.3
Smith, T.F.4
Balfanz, D.5
Smetters, D.K.6
Wong, H.C.7
Izadi, S.8
-
11
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
The Internet Society, January. RFC 2459
-
R. Housley, W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF - Network Working Group, The Internet Society, January 1999. RFC 2459.
-
(1999)
IETF - Network Working Group
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
12
-
-
84944771092
-
-
bridge2java
-
IBM. bridge2java. http://www.alphaworks.ibm.com/tech/bridge2java/.
-
-
-
IBM1
-
13
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
ACM
-
D. K. Smetters and R. E. Grinter. Moving from the design of usable security technologies to the design of useful secure applications. In New Security Paradigms Workshop '02. ACM, 2002.
-
(2002)
New Security Paradigms Workshop '02
-
-
Smetters, D.K.1
Grinter, R.E.2
|