The Role of Trust Management in Distributed Systems Security
暂无分享,去创建一个
[1] Yacov Yacobi,et al. The Complexity of Promise Problems with Applications to Public-Key Cryptography , 1984, Inf. Control..
[2] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[3] D. P. Maher,et al. Music on the Internet and the intellectual property protection problem , 1997, ISIE '97 Proceeding of the IEEE International Symposium on Industrial Electronics.
[4] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[5] William A. Arbaugh,et al. The SwitchWare active network architecture , 1998, IEEE Netw..
[6] Jan Vitek,et al. Secure Internet Programming , 1999 .
[7] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[8] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[9] Matt Blaze,et al. Transparent Internet E-mail Security , 1996 .
[10] Butler W. Lampson,et al. Simple Public Key Certificate , 1998 .
[11] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[12] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[13] Joan Feigenbaum,et al. Managing trust in an information-labeling system , 1997, Eur. Trans. Telecommun..
[14] Angelos D. Keromytis,et al. A secure active network environment architecture: realization in SwitchWare , 1998, IEEE Netw..
[15] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.
[16] Guy L. Steele,et al. The Java Language Specification , 1996 .
[17] Angelos D. Keromytis,et al. Firewalls in active networks , 1998 .
[18] Carl A. Gunter,et al. PLAN : A Programming Language for Active Networkssubmitted to PLDI ' 98 , 1998 .
[19] Carl A. Gunter,et al. PLAN: a packet language for active networks , 1998, ICFP '98.
[20] Paul Resnick,et al. PICS: Internet access controls without censorship , 1996, CACM.
[21] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[22] John V. Guttag,et al. ANTS: a toolkit for building and dynamically deploying network protocols , 1998, 1998 IEEE Open Architectures and Network Programming.
[23] Lixia Zhang,et al. Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification , 1997, RFC.
[24] Angelos D. Keromytis,et al. Security in Active Networks , 2001, Secure Internet Programming.
[25] David Wetherall,et al. Introducing new Internet services: why and how , 1998, IEEE Netw..
[26] Jerome H. Saltzer,et al. Kerberos authentication and authorization system , 1987 .