-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. W. Lampson, and G. D. Plotkin, “A calculus for access control in distributed systems,” ACM Trans. Programming Languages and Systems, vol. 15, no. 4, 1993.
-
(1993)
ACM Trans. Programming Languages and Systems
, vol.15
, Issue.4
-
-
Abadi, M.1
Burrows, M.2
Lampson, B. W.3
Plotkin, G. D.4
-
3
-
-
84856598167
-
Block-level security for network-attached disks
-
M. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli, D. Andersen, M. Burrows, T. Mann, and C. Thekkath, “Block-level security for network-attached disks,” in USENIX Conf. on File and Storage Technologies, (FAST), 2003.
-
(2003)
USENIX Conf. on File and Storage Technologies, (FAST)
-
-
Aguilera, M.1
Ji, M.2
Lillibridge, M.3
MacCormick, J.4
Oertli, E.5
Andersen, D.6
Burrows, M.7
Mann, T.8
Thekkath, C.9
-
4
-
-
77957587422
-
Towards a formal foundation of Web security
-
D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song, “Towards a formal foundation of Web security,” in IEEE Computer Security Foundations (CSF), 2010.
-
(2010)
IEEE Computer Security Foundations (CSF)
-
-
Akhawe, D.1
Barth, A.2
Lam, P. E.3
Mitchell, J.4
Song, D.5
-
5
-
-
85180621642
-
-
Amazon Inc., “Example cases for Amazon S3 Bucket Policies,” 2013, http://docs.aws.amazon.com/AmazonS3/latest/dev/AccessPolicyLanguage_UseCases_s3_a.html.
-
(2013)
Example cases for Amazon S3 Bucket Policies
-
-
-
7
-
-
84914104881
-
Transport layer security (TLS) Channel IDs
-
D. Balfanz and R. Hamilton, “Transport layer security (TLS) Channel IDs,” IETF Draft, 2013, http://tools.ietf.org/html/draft-balfanz-tlschannelid.
-
(2013)
IETF Draft
-
-
Balfanz, D.1
Hamilton, R.2
-
9
-
-
77954754889
-
SecPAL: Design and semantics of a decentralized authorization language
-
M. Y. Becker, C. Fournet, and A. D. Gordon, “SecPAL: Design and semantics of a decentralized authorization language,” Journal of Computer Security, vol. 18, no. 4, 2010.
-
(2010)
Journal of Computer Security
, vol.18
, Issue.4
-
-
Becker, M. Y.1
Fournet, C.2
Gordon, A. D.3
-
10
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
B. Blanchet, “Automatic verification of correspondences for security protocols,” Journal of Computer Security, vol. 17, no. 4, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
-
-
Blanchet, B.1
-
13
-
-
85180637217
-
The OAuth 2.0 authorization framework: Holder-of-the-key token usage
-
J. Bradley, P. Hunt, T. Nadalin, and H. Tschofenig, “The OAuth 2.0 authorization framework: Holder-of-the-key token usage,” IETF Draft, http://tools.ietf.org/html/draft-tschofenig-oauth-hotk.
-
IETF Draft
-
-
Bradley, J.1
Hunt, P.2
Nadalin, T.3
Tschofenig, H.4
-
16
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest, “Certificate chain discovery in SPKI/SDSI,” Journal of Computer Security, vol. 9, no. 4, 2002.
-
(2002)
Journal of Computer Security
, vol.9
, Issue.4
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R. L.6
-
17
-
-
84895539842
-
The OAuth 2.0 Authorization Framework
-
E. D. Hardt, “The OAuth 2.0 Authorization Framework,” IETF RFC 6749 (Informational), 2012, http://tools.ietf.org/html/rfc6749.
-
(2012)
IETF RFC 6749 (Informational)
-
-
Hardt, E. D.1
-
18
-
-
0025508369
-
Network security via private-key certificates
-
D. Davis and R. R. Swick, “Network security via private-key certificates,” Operating Systems Review, vol. 24, no. 4, 1990.
-
(1990)
Operating Systems Review
, vol.24
, Issue.4
-
-
Davis, D.1
Swick, R. R.2
-
21
-
-
84940397122
-
Origin-bound certificates: A fresh approach to strong client authentication for the web
-
M. Dietz, A. Czeskis, D. Balfanz, and D. S. Wallach, “Origin-bound certificates: A fresh approach to strong client authentication for the web,” in Proc. USENIX Security, 2012.
-
(2012)
Proc. USENIX Security
-
-
Dietz, M.1
Czeskis, A.2
Balfanz, D.3
Wallach, D. S.4
-
22
-
-
0032218229
-
A security architecture for computational grids
-
I. T. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, “A security architecture for computational grids,” in ACM Computer and Communications Security (CCS)), 1998.
-
(1998)
ACM Computer and Communications Security (CCS))
-
-
Foster, I. T.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
23
-
-
21644483415
-
Sharp: An architecture for secure resource peering
-
Y. Fu, J. Chase, B. Chun, S. Schwab, and A. Vahdat, “Sharp: An architecture for secure resource peering,” in Symp. on Operating Systems Principles (SOSP), 2003.
-
(2003)
Symp. on Operating Systems Principles (SOSP)
-
-
Fu, Y.1
Chase, J.2
Chun, B.3
Schwab, S.4
Vahdat, A.5
-
27
-
-
85180620688
-
-
Google Inc., “Belay research project,” 2012, https://code.google.com/p/google-belay/.
-
(2012)
Belay research project
-
-
-
28
-
-
85180632343
-
-
Google Inc., “YouTube video privacy settings,” 2013, http://support.google.com/youtube/bin/answer.py?hl=en&answer=157177.
-
(2013)
YouTube video privacy settings
-
-
-
30
-
-
85180626539
-
Web Services Security: SAML Token Profile
-
P. Hallam-Baker, C. Kaler, R. Monzillo, and A. Nadalin, “Web Services Security: SAML Token Profile,” OASIS, 2004, http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0.pdf.
-
(2004)
OASIS
-
-
Hallam-Baker, P.1
Kaler, C.2
Monzillo, R.3
Nadalin, A.4
-
31
-
-
85180632593
-
HTTP authentication: MAC access authentication
-
E. Hammer-Lahav, A. Barth, and B. Adida, “HTTP authentication: MAC access authentication,” IETF Draft, http://tools.ietf.org/html/draft-hammer-oauth-v2-mac-token.
-
IETF Draft
-
-
Hammer-Lahav, E.1
Barth, A.2
Adida, B.3
-
32
-
-
0016984825
-
Protection in operating systems
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, “Protection in operating systems,” Comm. of the ACM (CACM), vol. 19, no. 8, 1976.
-
(1976)
Comm. of the ACM (CACM)
, vol.19
, Issue.8
-
-
Harrison, M. A.1
Ruzzo, W. L.2
Ullman, J. D.3
-
36
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. W. Lampson, M. Abadi, M. Burrows, and E. Wobber, “Authentication in distributed systems: Theory and practice,” ACM Trans. on Computer Systems, vol. 10, no. 4, 1992.
-
(1992)
ACM Trans. on Computer Systems
, vol.10
, Issue.4
-
-
Lampson, B. W.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
37
-
-
77952364800
-
Alpaca: Extensible authorization for distributed services
-
C. Lesniewski-Laas, B. Ford, J. Strauss, R. Morris, and M. F. Kaashoek, “Alpaca: Extensible authorization for distributed services,” in ACM Computer and Communications Security (CCS)), 2007.
-
(2007)
ACM Computer and Communications Security (CCS))
-
-
Lesniewski-Laas, C.1
Ford, B.2
Strauss, J.3
Morris, R.4
Kaashoek, M. F.5
-
38
-
-
33646242539
-
Understanding SPKI/SDSI using first-order logic
-
N. Li and C. Mitchell, “Understanding SPKI/SDSI using first-order logic,” Intl. Journal of Inf. Security, vol. 5, no. 1, 2006.
-
(2006)
Intl. Journal of Inf. Security
, vol.5
, Issue.1
-
-
Li, N.1
Mitchell, C.2
-
41
-
-
85180629528
-
-
Mozilla, “BrowserID specification,” https://github.com/mozilla/id-specs/blob/prod/browserid/index.md.
-
BrowserID specification
-
-
-
42
-
-
0013091373
-
-
National Institute of Standards and Technology, [Online]. Available
-
National Institute of Standards and Technology, “FIPS PUB 198-1: The keyed-hash message authentication code (HMAC),” 2008. [Online]. Available: http://csrc.nist.gov/publications/fips/fips198-1/FIPS198-1_final.pdf
-
(2008)
FIPS PUB 198-1: The keyed-hash message authentication code (HMAC)
-
-
-
43
-
-
0027316628
-
Proxy-based authorization and accounting for distributed systems
-
B. C. Neuman, “Proxy-based authorization and accounting for distributed systems,” in Conf. on Distributed Computing Systems, 1993.
-
(1993)
Conf. on Distributed Computing Systems
-
-
Neuman, B. C.1
-
46
-
-
19944381369
-
Internet X.509 public key infrastructure (PKI) proxy certificate profile
-
[Online]. Available
-
E. S. Tuecke, “Internet X.509 public key infrastructure (PKI) proxy certificate profile,” IETF RFC 3820 (Standards track), 2004. [Online]. Available: http://www.ietf.org/rfc/rfc3820.txt
-
(2004)
IETF RFC 3820 (Standards track)
-
-
Tuecke, E. S.1
-
49
-
-
84869401890
-
The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems
-
S.-T. Sun and K. Beznosov, “The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems,” in ACM Computer and Communications Security (CCS)), 2012.
-
(2012)
ACM Computer and Communications Security (CCS))
-
-
Sun, S.-T.1
Beznosov, K.2
-
50
-
-
0026186487
-
The amoeba distributed operating system–a status report
-
A. Tanenbaum, M. Kaashoek, R. van Renesse, and H. Bal, “The amoeba distributed operating system–a status report,” Computer communications, vol. 14, no. 6, 1991.
-
(1991)
Computer communications
, vol.14
, Issue.6
-
-
Tanenbaum, A.1
Kaashoek, M.2
van Renesse, R.3
Bal, H.4
-
51
-
-
84877669699
-
Secure abstraction with code capabilities
-
R. van Renesse, H. D. Johansen, N. Naigaonkar, and D. Johansen, “Secure abstraction with code capabilities,” in Intl. Conf. on Parallel, Distributed, and Network-Based Processing, 2013.
-
(2013)
Intl. Conf. on Parallel, Distributed, and Network-Based Processing
-
-
van Renesse, R.1
Johansen, H. D.2
Naigaonkar, N.3
Johansen, D.4
-
52
-
-
0028380781
-
Authentication in the Taos operating system
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson, “Authentication in the Taos operating system,” ACM Trans. on Computer Systems, vol. 12, no. 1, 1994.
-
(1994)
ACM Trans. on Computer Systems
, vol.12
, Issue.1
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
54
-
-
85180631018
-
-
ZDNet: Between the Lines, “Dropbox adds Facebook sharing,” 2012, http://www.zdnet.com/facebook-gets-involved-with-cloud-storage-viadropbox-integration-7000004861/.
-
(2012)
Dropbox adds Facebook sharing
-
-
|