-
1
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
Spring
-
M. Bishop and M. Dilger. Checking for Race Conditions in File Accesses. Computing Systems, pages 131-152, Spring 1996.
-
(1996)
Computing Systems
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
2
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
Proceedings of the 1998 Security Protocols International Workshop
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures. In Proceedings of the 1998 Security Protocols International Workshop, Springer LNCS vol. 1550, pages 59-63, 1998.
-
(1998)
Springer LNCS
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
4
-
-
0004035649
-
-
Version 1.0. IETF Request for Comments 2246
-
T. Dierks and C. Allen. The TLS Protocol, Version 1.0. IETF Request for Comments 2246, 1999.
-
(1999)
The TLS Protocol
-
-
Dierks, T.1
Allen, C.2
-
5
-
-
0003593599
-
-
IETF Request for Comments 2693
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI Certificate Theory. IETF Request for Comments 2693, 1998.
-
(1998)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
7
-
-
0010390053
-
-
(TR2001-820). Technical report, Department of Computer Science, New York University
-
E. Freudenthal, E. Keenan, T. Pesin, L. Port, and V. Karamcheti. DisCo: A Distribution Infrastructure for Securely Deploying Decomposable Services in Partially Trusted Environments (TR2001-820). Technical report, Department of Computer Science, New York University, 2001.
-
(2001)
DisCo: A Distribution Infrastructure for Securely Deploying Decomposable Services in Partially Trusted Environments
-
-
Freudenthal, E.1
Keenan, E.2
Pesin, T.3
Port, L.4
Karamcheti, V.5
-
8
-
-
0036376894
-
DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments
-
Vienna, Austria
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. In Proceedings of the Twenty-second IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2002. To appear.
-
(2002)
Proceedings of the Twenty-second IEEE International Conference on Distributed Computing Systems (ICDCS)
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
11
-
-
84994268608
-
-
E. Rescorla. PureTLS. Available at http://www.puretls.org.
-
-
-
Rescorla, E.1
-
13
-
-
0028699105
-
Role-based access control: A multi-dimensional view
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control: A multi-dimensional view. In 10th Annual Computer Security Applications Conference, pages 54-62, 1994.
-
(1994)
10th Annual Computer Security Applications Conference
, pp. 54-62
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 20(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.20
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
15
-
-
0042005316
-
Gryphon: An Information Flow Based Approach to Message Brokering
-
R. Strom, G. Banovar, T. Chandra, M. Kaplan, K. Miller, B. Mukherji, D. Sturman, and M. Ward. Gryphon: An Information Flow Based Approach to Message Brokering. In Proceedings of the International Symposium on Software Reliability Engineering, 1998.
-
(1998)
Proceedings of the International Symposium on Software Reliability Engineering
-
-
Strom, R.1
Banovar, G.2
Chandra, T.3
Kaplan, M.4
Miller, K.5
Mukherji, B.6
Sturman, D.7
Ward, M.8
-
16
-
-
0343762482
-
-
T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne, and S. Lehtinen. SSH Protocol Architecture. Available at http://www.ssh.com/tech, 2001.
-
(2001)
SSH Protocol Architecture
-
-
Ylonen, T.1
Kivinen, T.2
Saarinen, M.3
Rinne, T.4
Lehtinen, S.5
|