Distributed Credential Chain Discovery in Trust Management

BIBLIO: Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management (extended abstract). In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 156--165. ACM Press, November 2001.

Remarks:


A Practically Implementable and Tractable Delegation Logic

Biblio: N. Li, B. Grosof, and J. Feigenbaum, "A Practically Implementable and Tractable Delegation Logic," to appear in Proceedings of the 2000 IEEE Symposium on Security and Privacy.

Remarks:


Understanding Trust Management Systems

Biblio: Weeks, S., Understanding Trust Management Systems, IEEE, 2001 http://citeseer.nj.nec.com/weeks01understanding.html

Remarks:


KeyNote: Trust Management for Public-Key Infrastructures

Biblio: Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. KeyNote: Trust management for publickey infrastructures. In Proc. Cambridge 1998 Security Protocols International Workshop, pages 59--63, 1998.

Remarks:


Fast access control decisions from delegation certificate databases

Biblio: Tuomas Aura. Fast access control decisions from delegation certicate databases. In Proceedings of 3rd Australasian Conference on Information Security and Privacy ACISP '98, volume 1438 of LNCS, pages 284295, Brisbane, Australia, July 1998. Springer Verlag.

Remarks:


SDSI A Simple Distributed Security Infrastructure

Biblio: R. L. Rivest and B. Lampson. SDSI --- A Simple Distributed Security Infrastructure. Version 1.1, at http://theory. lcs.mit.edu/rivest/sdsi11.html, October 2, 1996

Remarks:


dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments

Biblio: Eric Freudenthal, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments (TR2001-819). In Proceedings of the Twenty-second IEEE International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2002.

Remarks:


Towards Practical Automated Trust Negotiation

Biblio: William H. Winsborough and Ninghui Li. Towards practical automated trust negotiation. To appear in IEEE 3rd Intl. Workshop on Policies for Distributed Systems and Networks (Policy 2002).

Remarks:


REFEREE: Trust Management for Web Applications

Biblio: Y.-h. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss, "REFEREE: Trust Management for Web Applications," submitted for conference publication. http://citeseer.nj.nec.com/58910.html

Remarks:


The Role of Trust Management in Distributed Systems Security

Biblio: M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming

1999 (book) Paper - Previous to 1996

Remarks:


Decentralized Trust Management (1996)

Biblio: M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings 1996 IEEE Symposium on Security and Privacy, pages 164--173, May 1996.

Remarks:


A State-Transition Model of Trust Management and Access Control

Biblio: Chander, A., Dean, D. & Mithell, J., A State-Transition Model of Trust Management and Access Control, IEEE, 2001

Remarks:


A Survey of Trust in Internet Applications (2000)

Biblio: T. Grandison and M.Sloman, A survey of trust in Internet application, IEEE Communications Surveys, Fourth Quarter, 2000.

Remarks:


Trust Management for IPsec

@article{505587},
 title = {Trust management for IPsec},
 journal = {ACM Transactions on Information and System Security (TISSEC)},
 volume = {5},
 number = {2},
 year = {2002},
 issn = {1094-9224},
 pages = {95--118},
 doi = {http://doi.acm.org/10.1145/505586.505587},
 publisher = {ACM Press},
 }

Remarks:


Understanding SPKI/SDSI Using First-Order Logic

To appear in IEEE Computer Security Foundations Workshop, Pacific Grove, California, June 2003.


ResearchPapersForMasters (last edited 2003-11-07 05:32:48 by dot)