Trusted Computing or Distributed Trust Management
暂无分享,去创建一个
[1] Joseph Y. Halpern,et al. A Logic for SDSI's Linked Local Name Spaces , 2001, J. Comput. Secur..
[2] Richard M. Stallman,et al. The right to read , 1997, CACM.
[3] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[4] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.
[5] Steven Tuecke,et al. X.509 Proxy Certificates for Dynamic Delegation , 2004 .
[6] Peter Davis,et al. Extensible Resource Identifier (XRI) , 2005 .
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Ken Klingenstein. 3rd Annual PKI R&D Workshop , 2004 .
[9] Tuomas Aura,et al. On the structure of delegation networks , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[10] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[11] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[12] Ninghui Li,et al. Local names in SPKI/SDSI , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[13] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[14] Martín Abadi. On SDSI's linked local name spaces , 1998 .
[15] Adam Rifkin,et al. Weaving a Web of trust , 1997, World Wide Web J..
[16] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[17] John Walker,et al. The digital imprimatur: How big brother and big media can put the internet genie back in the bottle , 2003 .
[18] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Benjamin N. Grosof,et al. A practically implementable and tractable delegation logic , 2000, S&P 2000.
[20] Mark Stamp,et al. Digital Rights Management: The Technology Behidn The Hype , 2003 .