Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
139 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI using first-order logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(1), pp. 48-64, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SPKT, SDSI, Trust, Logic programs, management, Language, Logic |
139 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI Using First-Order Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 89-, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
131 | Ninghui Li |
Local Names in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 2-15, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
SDSI, access control, logic programming, authorization, security policies, trust management, SPKI |
123 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 156-173, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
100 | Arul Ganesh, K. Gopinath |
SPKI/SDSI certificate chain discovery with generic constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, Bangalore, India, January 18-20, 2008, pp. 3, 2008, ACM, 978-1-59593-950-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
WPDS, certificate chain, validity specification, security, policy, SPKI/SDSI |
100 | Somesh Jha, Thomas W. Reps |
Analysis of SPKI/SDSI Certificates Using Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 129-, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
91 | Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, Hiroshi G. Okuno |
Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server . ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 17th International Conference on Advanced Information Networking and Applications (AINA'03), March 27-29, 2003, Xi'an, China, pp. 696-703, 2003, IEEE Computer Society, 0-7695-1906-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
91 | Joseph Y. Halpern, Ron van der Meyden |
A Logical Reconstruction of SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 59-70, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
75 | Michelle S. Wangham, Emerson Ribeiro de Mello, Joni da Silva Fraga, Davi da Silva Böger |
A Model to support SPKI Federations management through XKMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 338-345, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Mads Dam |
Regular SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 134-150, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
72 | Alessandro Bassi, Julien Laganier |
Towards an IPv6-Based Security Framework for Distributed Storage Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 54-64, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
IBP, authorization certificates, CBID, IPv6, IPsec, CGA, SPKI |
72 | Vitaly Shmatikov |
Probabilistic Analysis of Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 119-128, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
59 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 177-193, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 |
Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SELMAS ![In: Software Engineering for Multi-Agent Systems II, Research Issues and Practical Applications [the book is a result of SELMAS 2003], pp. 207-224, 2003, Springer, 3-540-21182-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero |
Extending the SDSI / SPKI Model through Federation Webs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 132-145, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno |
Privacy-Enhanced Access Control by SPKI and Its Application to Web Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 201-206, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
56 | Guillermo Navarro 0001, Joan Borrell, Jose A. Ortega-Ruiz, Sergi Robles |
Access control with safe role assignment for mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 1235-1236, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, access control, mobile agents, SPKI |
56 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 31-40, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
48 | Emerson Ribeiro de Mello, Joni da Silva Fraga, Altair Olivo Santin, Frank Siqueira |
Building Trust Chains between CORBA Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LADC ![In: Dependable Computing, First Latin-American Symposium, LADC 2003, Sao Paulo, Brazil, October 21-24, 2003, Proceedings, pp. 102-116, 2003, Springer, 3-540-20224-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Altair Olivo Santin, Joni da Silva Fraga, Frank Siqueira, Emerson Ribeiro de Mello |
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 6-8 October 2003, Florence, Italy, pp. 66-75, 2003, IEEE Computer Society, 0-7695-1955-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Jeom Goo Kim, Do Hyeon Lee |
An Access Control Using SPKI Certificate in Peer-to-Peer Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 148-156, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Simple Public Key Infrastructure, Peer-to-Peer Environment |
44 | Yong Ma, Yumin Tian |
The Coarse-Grained Computing P2P Algorithm Based on SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (2) ![In: Advances in Natural Computation, Second International Conference, ICNC 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part II, pp. 394-401, 2006, Springer, 3-540-45907-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | YoungLok Lee, HyungHyo Lee, Seungyong Lee 0001, HeeMan Park, BongNam Noh |
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 490-498, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jon Howell, David Kotz |
A Formal Semantics for SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 140-158, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
40 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 424-456, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
40 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 7(4-5), pp. 371-389, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
40 | Urs Hengartner, Peter Steenkiste |
Implementing access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 11-20, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust, rsa, location, certificates, delegation, dsa, spki/sdsi |
40 | Refik Molva, Yves Roudier |
A Distributed Access Control Model for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 291-308, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Java, distribution, capabilities, access control model, SPKI |
32 | Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, Dejvuth Suwimonteerabuth |
SDSIrep: A Reputation System Based on SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 501-516, 2008, Springer, 978-3-540-78799-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Katia Hristova, K. Tuncay Tekle, Yanhong A. Liu |
Efficient trust management policy analysis from rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 9th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 14-16, 2007, Wroclaw, Poland, pp. 211-220, 2007, ACM, 978-1-59593-769-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, algorithm, access control, time complexity, policy analysis |
32 | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps |
Weighted Pushdown Systems and Trust-Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 12th International Conference, TACAS 2006 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 25 - April 2, 2006, Proceedings, pp. 1-26, 2006, Springer, 3-540-33056-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Jin-Bum Hwang, Jong Wook Han |
A Security Model for Home Networks with Authority Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 360-369, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Sanna Liimatainen |
Usability of Decentralized Authorization Systems - A Comparative Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Tadashi Komori, Takamichi Saito |
A Secure Wireless LAN System Retaining Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 370-375, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 104-116, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Ilari Lehti, Pekka Nikander |
Certifying Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 83-98, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison |
SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1243-1245, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Dominik Wojtczak |
Trust Metrics for the SPKI/SDSI Authorisation Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings, pp. 168-182, 2011, Springer, 978-3-642-24371-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Dejvuth Suwimonteerabuth |
Computing Minimum-Height Certificate Trees in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICS ![In: 10th International Conference on Innovative Internet Community Services (I2CS), Jubilee Edition 2010, June 3-5, 2010, Bangkok, Thailand, pp. 340-349, 2010, GI, 978-3-88579-259-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
28 | Mokdong Chung, Jaehyuk Choi 0005, Kiyeal Lee, Shi-Kook Rhyoo |
Constructing Enterprise Application Framework for Secure RFID Application Using SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALPIT ![In: Proceedings of The Sixth International Conference on Advanced Language Processing and Web Information Technology, ALPIT 2007, Luoyang, Henan, China, 22-24 August 2007, pp. 572-577, 2007, IEEE Computer Society, 978-0-7695-2930-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Arun K. Eamani, A. Prasad Sistla |
Language based policy analysis in a SPKI Trust Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 14(4), pp. 327-357, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | José de R. P. Braga Jr., Alexandre Ceasar Tavares Vidal, Fabio Kon, Marcelo Finger |
Trust in large-scale computational grids: an SPKI/SDSI extension for representing opinion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MGC@Middleware ![In: Proceedings of the 4th international workshop on Middleware for grid computing, MCG 2006, Melbourne, Australia, November 27 - December 1, 2006, pp. 7, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison |
SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Somesh Jha, Thomas W. Reps |
Model checking SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 12(3-4), pp. 317-353, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Sidharth Nazareth, Sean W. Smith |
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes, pp. 218-226, 2004, IADIS, 972-99353-0-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
28 | Joseph Y. Halpern, Ron van der Meyden |
A Logical Reconstruction of SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 11(4), pp. 581-614, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Mads Dam |
Regular SPKI (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 151-152, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Joseph Y. Halpern, Ron van der Meyden |
A logical reconstruction of SPKI ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CR/0208028, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Yki Kortesniemi |
SPKI Performance and Certificate Chain Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI Jahrestagung ![In: 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30 - October 3, 2002, pp. 449-452, 2002, GI, 3-88579-348-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest |
Certificate Chain Discovery in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 9(4), pp. 285-322, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Yki Kortesniemi, Tero Hasu, Jonna Särs |
A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA, 2000, The Internet Society, 1-891562-07-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
28 | Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno |
Privacy enhanced access control by SPKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS Workshops ![In: Seventh International Conference on Parallel and Distributed Systems Workshops, ICPADS 2000 Workshops, Iwate, Japan, July 4-7, 2000, pp. 301-306, 2000, IEEE Computer Society, 0-7695-0571-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison, Bill Frantz, Butler W. Lampson, Ron Rivest, Brian Thomas, Tatu Ylönen |
SPKI Certificate Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2693, pp. 1-43, September 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison |
SPKI Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2692, pp. 1-14, September 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Carl M. Ellison, Steve Dohrmann |
Public-key support for group collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 547-565, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
S/MIME, SDSI, PKI, Human-computer interface, IPsec, PGP, SSH, SPKI |
16 | Ladislav Huraj, Vladimír Siládi |
Authorization through trust chains in ad hoc grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, EATIS 2009, Prague, Czech Republic, June 3-5, 2009, pp. 13, 2009, 978-1-60558-398-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
certificate chain, authorization, delegation, ad hoc grid |
16 | Karl Krukow, Mogens Nielsen |
Trust structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(2-3), pp. 153-181, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Trust structures, Denotational and operational semantics, Trust management, I/O automata, Foundations |
16 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 177-192, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier Esparza |
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 4th International Symposium, ATVA 2006, Beijing, China, October 23-26, 2006., pp. 141-153, 2006, Springer, 3-540-47237-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee 0001, HyungHyo Lee |
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (2) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 96-103, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Lauri I. W. Pesonen, David M. Eyers, Jean Bacon |
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2006 International Symposium on Applications and the Internet (SAINT 2006), 23-27 January 2006, Phoenix, Arizona, USA, pp. 222-228, 2006, IEEE Computer Society, 0-7695-2508-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Lauri I. W. Pesonen, Jean Bacon |
Secure event types in content-based, multi-domain publish/subscribe systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEM ![In: Proceedings of the 5th International Workshop on Software Engineering and Middleware, SEM 2005, Lisbon, Portugal, September 5-6, 2005, pp. 98-105, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Julien Laganier, Pascale Vicat-Blanc Primet |
HIPernet: a decentralized security infrastructure for large scale grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 140-147, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Michelle S. Wangham, Joni da Silva Fraga, Ricardo Schmidt, Ricardo J. Rabelo |
MASS: A Mobile Agent Security Scheme for the Creation of Virtual Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobility Aware Technologies and Applications, First International Workshop,MATA 2004, Florianópolis, Brazil, October 20-22, 2004, Proceedings, pp. 234-243, 2004, Springer, 3-540-23423-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Klaus Herrmann 0001, Michael A. Jaeger |
PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 66-78, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai |
Certificate-based authorization policy in a PKI environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 566-588, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XML, Public key infrastructure, digital certificates |
16 | Trevor Perrin |
Public key distribution through "cryptoIDs". ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland, pp. 87-102, 2003, ACM, 1-58113-880-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptoIDs, key management, fingerprints, key distribution, public key infrastructure |
16 | Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest |
Proxy-based security protocols in networked mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 265-272, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
certificate chain, certificate chain discovery, security, protocol, mobile device, wireless, authorization, certificate, ubiquitous, proxy, pervasive |
16 | Guillermo Navarro 0001, Sergi Robles, Joan Borrell |
Role-Based Access Control for E-commerce Sea-of-Data Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 102-116, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yuh-Jong Hu |
Some thoughts on agent trust and delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agents ![In: Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001, Montreal, Canada, May 28 - June 1, 2001, pp. 489-496, 2001, ACM, 1-58113-326-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
XML |
16 | Stephen Weeks |
Understanding Trust Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 94-105, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
AMBAR Protocol: Access Management Based on Authorization Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 376-380, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Himanshu Khurana, Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 100-112, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Dirk Balfanz, Drew Dean, Mike Spreitzer |
A Security Infrastructure for Distributed Java Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 15-26, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Access Control Logics, Security, Java, Access Control, Distributed Computing |
16 | Andrew W. Appel, Edward W. Felten |
Proof-Carrying Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999., pp. 52-62, 1999, ACM, 1-58113-148-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Pekka Nikander, Yki Kortesniemi, Jonna Partanen |
Preserving Privacy in Distributed Delegation with Fast Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 136-153, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Rolf Oppliger |
Authorization Methods for E-Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: The Eighteenth Symposium on Reliable Distributed Systems, SRDS 1999, Lausanne, Switzerland, October 19-22, 1999, Proceedings, pp. 366-371, 1999, IEEE Computer Society, 0-7695-0290-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|