Proof-Carrying Authentication (1999)

Cached

Download Links

by Andrew W. Appel , Edward W. Felten
Venue:In Proceedings of the 6th ACM Conference on Computer and Communications Security
Citations:179 - 6 self

Documents Related by Co-Citation

352 A Calculus for Access Control in Distributed Systems – M. Abadi, M. Burrows, B. Lampson, G. Plotkin, J. Kohl, C. Neuman, J. Steiner - 1991
443 Authentication in distributed systems: Theory and practice – Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber - 1992
104 On SDSI's Linked Local Name Spaces – Martín Abadi - 1998
110 a logic-based security language – Binder - 2002
198 Delegation Logic: A Logic-based Approach to Distributed Authorization – Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum - 2000
176 Authentication in the Taos operating system – Edward Wobber, Michael Burrows - 1994
36 A security infrastructure for distributed Java applications – Dirk Balfanz - 2000
822 Decentralized Trust Management – Matt Blaze, Joan Feigenbaum, Jack Lacy - 1996
95 Datalog with Constraints: A Foundation for Trust Management Languages – Ninghui Li, John C. Mitchell - 2003
285 Design of a role-based trust management framework – Ninghui Li, John C. Mitchell - 2002
47 Access Control for the Web via Proof-Carrying Authorization – Ljudevit Bauer - 2003
65 A General and Flexible Access-Control System for the Web – Lujo Bauer , Michael A. Schneider, Edward W. Felten - 2002
72 Distributed proving in access-control systems – Lujo Bauer, Scott Garriss, Michael K. Reiter - 2005
310 SDSI - A Simple Distributed Security Infrastructure – Ronald L. Rivest, Butler Lampson - 1996
265 The keynote trust-management system version 2. Internet Request For Comments 2704 – M BLAZE, ET AL
83 Compliance Checking in the PolicyMaker Trust Management System – Matt Blaze, Joan Feigenbaum, Martin Strauss - 1998
28 Certificate Discovery Using SPKI/SDSI 2.0 Certificates – Jean-Emile Elien - 1998
150 SD3: A Trust Management System With Certified Evaluation – T Jim - 2001
84 A logical framework for reasoning about access control models – Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca - 2003