메뉴 건너뛰기




Volumn 1603, Issue , 1999, Pages 211-235

Distributed access-rights management with delegation certificates

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DISTRIBUTED COMPUTER SYSTEMS;

EID: 84982994153     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48749-2_9     Document Type: Conference Paper
Times cited : (58)

References (26)
  • 1
    • 0030644181 scopus 로고    scopus 로고
    • Proc. 10th IEEE Computer Security Foundations Workshop, Rockport, MA, June
    • Martin Abadi. On SDSI's linked local name spaces. In Proc. 10th IEEE Computer Security Foundations Workshop, pages 98-108, Rockport, MA, June 1997. IEEE Computer Society Press.
    • (1997) On Sdsi's Linked Local Name Spaces , pp. 98-108
    • Abadi, M.1
  • 3
    • 84956868429 scopus 로고    scopus 로고
    • Proc. 3rd Australasian Conference on Information Security and Privacy ACISP '98
    • Tuomas Aura. Fast access control decisions from delegation certificate databases. In Proc. 3rd Australasian Conference on Information Security and Privacy ACISP '98, volume 1438 of LNCS, pages 284-295, Brisbane, Australia, July 1998. Springer Verlag.
    • Fast Access Control Decisions from Delegation Certificate Databases , vol.1438 , pp. 284-295
    • Aura, T.1
  • 4
    • 0031641091 scopus 로고    scopus 로고
    • Proc. 11th IEEE Computer Security Foundations Workshop, pages 14-26, Rockport, MA, June 1998. IEEE Computer Society Press
    • Tuomas Aura. On the structure of delegation networks. In Proc. 11th IEEE Computer Security Foundations Workshop, pages 14-26, Rockport, MA, June 1998. IEEE Computer Society Press.
    • On the Structure of Delegation Networks
    • Aura, T.1
  • 5
    • 85094854734 scopus 로고    scopus 로고
    • Proc. USENIX Workshop on Smartcard Technology, Chicago, May 1999. USENIX Association
    • Tuomas Aura and Dieter GoUmann. Software license management with smart cards. In Proc. USENIX Workshop on Smartcard Technology, Chicago, May 1999. USENIX Association.
    • Software License Management with Smart Cards
    • Aura, T.1    Goumann, D.2
  • 9
    • 0029700344 scopus 로고    scopus 로고
    • Proc. 1996 IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, May 1996. IEEE Computer Society Press
    • Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proc. 1996 IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, May 1996. IEEE Computer Society Press.
    • Decentralized Trust Management
    • Blaze, M.1    Feigenbaum, J.2    Lacy, J.3
  • 11
    • 0024663219 scopus 로고    scopus 로고
    • Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1989. IEEE Computer Society Press
    • David F. Brewer and Michael J. Nash. The Chinese wall security policy. In Proc. IEEE Symposium on Research in Security and Privacy, pages 206-214, Oakland, CA, May 1989. IEEE Computer Society Press.
    • The Chinese Wall Security Policy , pp. 206-214
    • Brewer, D.F.1    Nash, M.J.2
  • 12
    • 0003715366 scopus 로고
    • Recommendation X.509, volume VIII of CCITT Blue Book
    • Recommendation X.509, The Directory-Authentication Framework, volume VIII of CCITT Blue Book, pages 48-81. CCITT, 1988.
    • (1988) The Directory-Authentication Framework , pp. 48-81
  • 13
    • 84982987032 scopus 로고    scopus 로고
    • Proc. 6th USENIX Security Symposium, San Jose, CA, July 1996. USENIX Association
    • CaxI M. Ellison. Establishing identity without certification authorities. In Proc. 6th USENIX Security Symposium, pages 67-76, San Jose, CA, July 1996. USENIX Association.
    • Establishing Identity without Certification Authorities , pp. 67-76
    • Ellison, C.M.1
  • 17
    • 0024664205 scopus 로고
    • Proc, IEEE Symposium on Research in Security and Privacy, pages 56-63, Oakland, CA, May 1989. IEEE, IEEE Computer Society Press
    • Li Gong. A secure identity-based capability system. In Proc. 1989 IEEE Symposium on Research in Security and Privacy, pages 56-63, Oakland, CA, May 1989. IEEE, IEEE Computer Society Press.
    • (1989) A Secure Identity-Based Capability System
    • Li, G.1
  • 20
    • 84959036812 scopus 로고    scopus 로고
    • Proc. First International Workshop on Practice and Theory in Public Key Cryptography PKC'98, of LNCS, Yokohama, Japan, February 1998. Springer
    • Ilari Lehti and Pekka Nikander. Certifying trust. In Proc. First International Workshop on Practice and Theory in Public Key Cryptography PKC'98, volume 1431 of LNCS, Yokohama, Japan, February 1998. Springer.
    • Certifying Trust , vol.1431
    • Lehti, I.1    Nikander, P.2
  • 21
    • 85094905425 scopus 로고    scopus 로고
    • Proc. 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), Santa Fe, NM, April, USENIX Association
    • Nataraj Nagaiatnam and Doug Lea. Secure delegation for distributed object environments. In Proc. 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), pages 101-115, Santa Fe, NM, April 1998. USENIX Association.
    • (1998) Secure Delegation for Distributed Object Environments , pp. 101-115
    • Nagaiatnam, N.1    Lea, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.