-
1
-
-
0030644181
-
-
Proc. 10th IEEE Computer Security Foundations Workshop, Rockport, MA, June
-
Martin Abadi. On SDSI's linked local name spaces. In Proc. 10th IEEE Computer Security Foundations Workshop, pages 98-108, Rockport, MA, June 1997. IEEE Computer Society Press.
-
(1997)
On Sdsi's Linked Local Name Spaces
, pp. 98-108
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, September 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
84956868429
-
-
Proc. 3rd Australasian Conference on Information Security and Privacy ACISP '98
-
Tuomas Aura. Fast access control decisions from delegation certificate databases. In Proc. 3rd Australasian Conference on Information Security and Privacy ACISP '98, volume 1438 of LNCS, pages 284-295, Brisbane, Australia, July 1998. Springer Verlag.
-
Fast Access Control Decisions from Delegation Certificate Databases
, vol.1438
, pp. 284-295
-
-
Aura, T.1
-
4
-
-
0031641091
-
-
Proc. 11th IEEE Computer Security Foundations Workshop, pages 14-26, Rockport, MA, June 1998. IEEE Computer Society Press
-
Tuomas Aura. On the structure of delegation networks. In Proc. 11th IEEE Computer Security Foundations Workshop, pages 14-26, Rockport, MA, June 1998. IEEE Computer Society Press.
-
On the Structure of Delegation Networks
-
-
Aura, T.1
-
5
-
-
85094854734
-
-
Proc. USENIX Workshop on Smartcard Technology, Chicago, May 1999. USENIX Association
-
Tuomas Aura and Dieter GoUmann. Software license management with smart cards. In Proc. USENIX Workshop on Smartcard Technology, Chicago, May 1999. USENIX Association.
-
Software License Management with Smart Cards
-
-
Aura, T.1
Goumann, D.2
-
6
-
-
31144442292
-
Delegation-based access control for intelligent network services
-
Brussels, Belgium, July
-
Tuomas Aura, Petteri Koponen, and Juhana Rasanen. Delegation-based access control for intelligent network services. In Proc. ECOOP Workshop on Distributed Object Security, Brussels, Belgium, July 1998.
-
(1998)
Proc. ECOOP Workshop on Distributed Object Security
-
-
Aura, T.1
Koponen, P.2
Rasanen, J.3
-
8
-
-
84982899264
-
The role of trust management in distributed systems security
-
J. Vitek and C. Jensen, editors, LNCS. Springer-Verlag Inc, New York, NY, USA
-
Matt Blaze, Joan Feigenbaum, John loannidis, and Angelos D. Keromytis. The role of trust management in distributed systems security. In J. Vitek and C. Jensen, editors. Secure Internet Programming: Security Issues for Distributed and Mobile Objects, LNCS. Springer-Verlag Inc, New York, NY, USA, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Distributed and Mobile Objects
-
-
Blaze, M.1
Feigenbaum, J.2
Loannidis, J.3
Keromytis, A.D.4
-
9
-
-
0029700344
-
-
Proc. 1996 IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, May 1996. IEEE Computer Society Press
-
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proc. 1996 IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, May 1996. IEEE Computer Society Press.
-
Decentralized Trust Management
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
84958048748
-
-
Proc. Financial Cryptography 98, volume 1465 of LNCS, pages 254-271, Anguilla, February 1998. Springer
-
Matt Blaze, Joan Feigenbaum, and Martin Strauss. Compliance checking in the PolicyMaker trust management system. In Proc. Financial Cryptography 98, volume 1465 of LNCS, pages 254-271, Anguilla, February 1998. Springer.
-
Compliance Checking in the Policymaker Trust Management System
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
11
-
-
0024663219
-
-
Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1989. IEEE Computer Society Press
-
David F. Brewer and Michael J. Nash. The Chinese wall security policy. In Proc. IEEE Symposium on Research in Security and Privacy, pages 206-214, Oakland, CA, May 1989. IEEE Computer Society Press.
-
The Chinese Wall Security Policy
, pp. 206-214
-
-
Brewer, D.F.1
Nash, M.J.2
-
12
-
-
0003715366
-
-
Recommendation X.509, volume VIII of CCITT Blue Book
-
Recommendation X.509, The Directory-Authentication Framework, volume VIII of CCITT Blue Book, pages 48-81. CCITT, 1988.
-
(1988)
The Directory-Authentication Framework
, pp. 48-81
-
-
-
13
-
-
84982987032
-
-
Proc. 6th USENIX Security Symposium, San Jose, CA, July 1996. USENIX Association
-
CaxI M. Ellison. Establishing identity without certification authorities. In Proc. 6th USENIX Security Symposium, pages 67-76, San Jose, CA, July 1996. USENIX Association.
-
Establishing Identity without Certification Authorities
, pp. 67-76
-
-
Ellison, C.M.1
-
14
-
-
84877498368
-
-
Internet draft, IETF SPKI Working Group
-
Carl M. Ellison, Bill Franz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylonen. SPKI certificate theory, Simple public key certificate, SPKI examples. Internet draft, IETF SPKI Working Group, November 1997.
-
(1997)
SPKI Certificate Theory, Simple Public Key Certificate, SPKI Examples
-
-
Ellison, C.M.1
Franz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
15
-
-
0003593599
-
-
Internet draft, IETF SPKI Working Group
-
Carl M. Ellison, Bill Franz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylonen. SPKI certificate theory. Internet draft, IETF SPKI Working Group, October 1998.
-
(1998)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Franz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
16
-
-
0003339136
-
The digital distributed system security architecture
-
Baltimore, MD, USA
-
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The digital distributed system security architecture. In Proc. National computer security conference, pages 305-319, Baltimore, MD, USA, October 1989.
-
(1989)
Proc. National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
17
-
-
0024664205
-
-
Proc, IEEE Symposium on Research in Security and Privacy, pages 56-63, Oakland, CA, May 1989. IEEE, IEEE Computer Society Press
-
Li Gong. A secure identity-based capability system. In Proc. 1989 IEEE Symposium on Research in Security and Privacy, pages 56-63, Oakland, CA, May 1989. IEEE, IEEE Computer Society Press.
-
(1989)
A Secure Identity-Based Capability System
-
-
Li, G.1
-
20
-
-
84959036812
-
-
Proc. First International Workshop on Practice and Theory in Public Key Cryptography PKC'98, of LNCS, Yokohama, Japan, February 1998. Springer
-
Ilari Lehti and Pekka Nikander. Certifying trust. In Proc. First International Workshop on Practice and Theory in Public Key Cryptography PKC'98, volume 1431 of LNCS, Yokohama, Japan, February 1998. Springer.
-
Certifying Trust
, vol.1431
-
-
Lehti, I.1
Nikander, P.2
-
21
-
-
85094905425
-
-
Proc. 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), Santa Fe, NM, April, USENIX Association
-
Nataraj Nagaiatnam and Doug Lea. Secure delegation for distributed object environments. In Proc. 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), pages 101-115, Santa Fe, NM, April 1998. USENIX Association.
-
(1998)
Secure Delegation for Distributed Object Environments
, pp. 101-115
-
-
Nagaiatnam, N.1
Lea, D.2
-
25
-
-
0028380781
-
Authentication in the Taos operating system
-
Edward P. Wobber, Maiti'n Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(l):3-32, February 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.P.1
Maiti'n Abadi, M.B.2
Lampson, B.3
|