Information Technology Reference
In-Depth Information
3. Firozabadi, B.S., Sergot, M., Bandmann, O.: Using Authority Certificates to Create Man-
agement Structures. Proceeding of Security Protocols, 9th International Workshop, Cam-
bridge, UK. Springer Verlag. In press (April 2001)
4. Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Cer-
tificate Theory. IETF RFC 2693 (1998)
5. Intelligent Systems Laboratory, Swedish Institute of Computer Science, SICStus Prolog
User's Manual, Release 3.11.1 (February 2004)
6. Sollins, K.R.: Cascaded Authentication. Proceedings of the 1988 IEEE Symposium on
Research in Security and Privacy (April 1988) 156-163
7. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. Proceedings of 17th
Symposium on Security and Privacy, Oakland. IEEE (1996) 164-173
8. Blaze, M., Feigenbaum, J., John Ioannidis, and Angelos D. Keromytis: The KeyNote trust
management system, version 2. IETF RFC 2704 (September 1999)
9. Schroeder, M.D., Saltzer, J.H.: The protection of information in computer systems. IEEE,
63(9) (September 1975) 1278-1308
10. Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management, Applied to Electronic
Health Records Proceedings of the 17th IEEE Computer Security Foundations Workshop
(CSFW'04) (2004)
11. Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distrib-
uted authorization. ACM Transaction on Information and System Security (TISSEC)
(2003)
12. Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management
framework. Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE
Computer Society Press (2002) 114-130
13. Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management lan-
guages. Proceedings of the 5th International Symposium on Practical Aspects of Declara-
tive Languages (2003) 58-73
14. Bandmann, O., Damy, M., Firozabadi, B.S.: Constrained Delegation, Proceedings of the
2002 IEEE Symposium on Security and Privacy (S&P'02) (2002)
15. Kanellakis, P.C., Kuper, G.M., Revesz, P.Z.: Constraint query languages. Journal of Com-
puter and System Sciences, 51(1) (1995) 26-52
16. Star middleware site, http://www.starmiddleware.net
17. Varadharajan, V., Allen, P., Black, S.: An Analysis of the Proxy Problem in Distributed
systems. IEEE Symposium on Research in Security and Privacy. Oakland, CA (1991)
18. Gang, Y., Meng, T, Huai-min, W. etc: An Authorization Framework Based on Con-
strained Delegation, International Symposium on Parallel and Distributed Processing and
Applications (ISPA'2004), Hong Kong, China, LNCS 3358, Springer Verlag (2004) 845-
857
 
Search WWH ::




Custom Search