Differences between revisions 5 and 6
Revision 5 as of 2003-09-20 19:01:38
Size: 803
Editor: yakko
Comment:
Revision 6 as of 2003-09-20 19:05:03
Size: 837
Editor: yakko
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
Paper: Distributed Credential Chain Discovery in Trust Management #pragma section-numbers off

===
Distributed Credential Chain Discovery in Trust Management ===
Line 9: Line 11:
Paper: A Practically Implementable and Tractable Delegation Logic === A Practically Implementable and Tractable Delegation Logic ===

Distributed Credential Chain Discovery in Trust Management

BIBLIO: Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management (extended abstract). In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 156--165. ACM Press, November 2001.

Remarks:


A Practically Implementable and Tractable Delegation Logic

Biblio: N. Li, B. Grosof, and J. Feigenbaum, "A Practically Implementable and Tractable Delegation Logic," to appear in Proceedings of the 2000 IEEE Symposium on Security and Privacy.

Remarks:

  • Good writing
  • Based on plain datalog
  • Uses OLP inference engines
  • Discusses tractability
  • NO DISCUSSION of constraints or CDBs


ResearchPapersForMasters (last edited 2003-11-07 05:32:48 by dot)