|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 64 occurrences of 37 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
338 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI using first-order logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(1), pp. 48-64, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SPKT, SDSI, Trust, Logic programs, management, Language, Logic |
338 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI Using First-Order Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 89-, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
255 | Ninghui Li |
Local Names in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 2-15, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
SDSI, access control, logic programming, authorization, security policies, trust management, SPKI |
254 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 156-173, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
205 | Arul Ganesh, K. Gopinath |
SPKI/SDSI certificate chain discovery with generic constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, Bangalore, India, January 18-20, 2008, pp. 3, 2008, ACM, 978-1-59593-950-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
WPDS, certificate chain, validity specification, security, policy, SPKI/SDSI |
205 | Somesh Jha, Thomas W. Reps |
Analysis of SPKI/SDSI Certificates Using Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 129-, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
148 | Vitaly Shmatikov |
Probabilistic Analysis of Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 119-128, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
132 | Joseph Y. Halpern, Ron van der Meyden |
A Logical Reconstruction of SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 59-70, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
123 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 177-193, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
123 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 |
Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SELMAS ![In: Software Engineering for Multi-Agent Systems II, Research Issues and Practical Applications [the book is a result of SELMAS 2003], pp. 207-224, 2003, Springer, 3-540-21182-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
115 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 31-40, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
99 | Emerson Ribeiro de Mello, Joni da Silva Fraga, Altair Olivo Santin, Frank Siqueira |
Building Trust Chains between CORBA Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LADC ![In: Dependable Computing, First Latin-American Symposium, LADC 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings, pp. 102-116, 2003, Springer, 3-540-20224-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
90 | YoungLok Lee, HyungHyo Lee, Seungyong Lee 0001, HeeMan Park, BongNam Noh |
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 490-498, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 424-456, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
82 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 7(4-5), pp. 371-389, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
82 | Urs Hengartner, Peter Steenkiste |
Implementing access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 11-20, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust, rsa, location, certificates, delegation, dsa, spki/sdsi |
82 | Michelle S. Wangham, Emerson Ribeiro de Mello, Joni da Silva Fraga, Davi da Silva Böger |
A Model to support SPKI Federations management through XKMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 338-345, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, Dejvuth Suwimonteerabuth |
SDSIrep: A Reputation System Based on SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 501-516, 2008, Springer, 978-3-540-78799-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Katia Hristova, K. Tuncay Tekle, Yanhong A. Liu |
Efficient trust management policy analysis from rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 9th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 14-16, 2007, Wroclaw, Poland, pp. 211-220, 2007, ACM, 978-1-59593-769-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, algorithm, access control, time complexity, policy analysis |
66 | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps |
Weighted Pushdown Systems and Trust-Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 12th International Conference, TACAS 2006 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 25 - April 2, 2006, Proceedings, pp. 1-26, 2006, Springer, 3-540-33056-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Sanna Liimatainen |
Usability of Decentralized Authorization Systems - A Comparative Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 104-116, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Dominik Wojtczak |
Trust Metrics for the SPKI/SDSI Authorisation Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings, pp. 168-182, 2011, Springer, 978-3-642-24371-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
57 | Dejvuth Suwimonteerabuth |
Computing Minimum-Height Certificate Trees in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICS ![In: 10th International Conference on Innovative Internet Community Services (I2CS), Jubilee Edition 2010, June 3-5, 2010, Bangkok, Thailand, pp. 340-349, 2010, GI, 978-3-88579-259-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
57 | Mokdong Chung, Jaehyuk Choi 0005, Kiyeal Lee, Shi-Kook Rhyoo |
Constructing Enterprise Application Framework for Secure RFID Application Using SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALPIT ![In: Proceedings of The Sixth International Conference on Advanced Language Processing and Web Information Technology, ALPIT 2007, Luoyang, Henan, China, 22-24 August 2007, pp. 572-577, 2007, IEEE Computer Society, 978-0-7695-2930-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | José de R. P. Braga Jr., Alexandre Ceasar Tavares Vidal, Fabio Kon, Marcelo Finger |
Trust in large-scale computational grids: an SPKI/SDSI extension for representing opinion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MGC@Middleware ![In: Proceedings of the 4th international workshop on Middleware for grid computing, MCG 2006, Melbourne, Australia, November 27 - December 1, 2006, pp. 7, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Carl M. Ellison |
SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Somesh Jha, Thomas W. Reps |
Model checking SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 12(3-4), pp. 317-353, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Sidharth Nazareth, Sean W. Smith |
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes, pp. 218-226, 2004, IADIS, 972-99353-0-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
57 | Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest |
Certificate Chain Discovery in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 9(4), pp. 285-322, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
49 | Jin-Bum Hwang, Jong Wook Han |
A Security Model for Home Networks with Authority Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 360-369, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 177-192, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier Esparza |
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 4th International Symposium, ATVA 2006, Beijing, China, October 23-26, 2006., pp. 141-153, 2006, Springer, 3-540-47237-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee 0001, HyungHyo Lee |
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (2) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 96-103, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Michelle S. Wangham, Joni da Silva Fraga, Ricardo Schmidt, Ricardo J. Rabelo |
MASS: A Mobile Agent Security Scheme for the Creation of Virtual Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobility Aware Technologies and Applications, First International Workshop,MATA 2004, Florianópolis, Brazil, October 20-22, 2004, Proceedings, pp. 234-243, 2004, Springer, 3-540-23423-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest |
Proxy-based security protocols in networked mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 265-272, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
certificate chain, certificate chain discovery, security, protocol, mobile device, wireless, authorization, certificate, ubiquitous, proxy, pervasive |
33 | Yuh-Jong Hu |
Some thoughts on agent trust and delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agents ![In: Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001, Montreal, Canada, May 28 - June 1, 2001, pp. 489-496, 2001, ACM, 1-58113-326-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
XML |
33 | Andrew W. Appel, Edward W. Felten |
Proof-Carrying Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999., pp. 52-62, 1999, ACM, 1-58113-148-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|