A logical reconstruction of SPKI
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[2] Martín Abadi,et al. On SDSI's linked local name spaces , 1997, Proceedings 10th Computer Security Foundations Workshop.
[3] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[4] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[5] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[6] Joseph Y. Halpern,et al. A Logic for SDSI's Linked Local Name Spaces , 2001, J. Comput. Secur..
[7] Ninghui Li,et al. Local names in SPKI/SDSI , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[8] Joseph Y. Halpern,et al. A logic for SDSI's linked local name spaces: preliminary version , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[9] Stephen Weeks,et al. Understanding trust management systems , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[10] Ronald L. Rivest,et al. Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..
[11] Jon Howell,et al. A Formal Semantics for SPKI , 2000, ESORICS.
[12] Butler W. Lampson,et al. Simple Public Key Certificate , 1998 .
[13] Joan Feigenbaum,et al. A logic-based knowledge representation for authorization with delegation , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[14] Maurizio Lenzerini,et al. The Complexity of Closed World Reasoning and Circumscription , 1990, AAAI.
[15] Simon S. Lam,et al. Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..
[16] Rebecca N. Wright,et al. An authentication logic supporting synchronization, revocation, and recency , 1996, CCS '96.
[17] Stuart G. Stubblebine,et al. Recent-secure authentication: enforcing revocation in distributed systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[18] Joan Feigenbaum,et al. A Nonmonotonic Delegation Logic with Prioritized Conflict Handling , 2000 .
[19] Tuomas Aura,et al. On the structure of delegation networks , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[20] Joan Feigenbaum,et al. Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation , 2002, Financial Cryptography.