A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS
暂无分享,去创建一个
[1] Fabio Martinelli,et al. Analysis of security protocols as open systems , 2003, Theor. Comput. Sci..
[2] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[3] Ninghui Li,et al. Safety in Automated Trust Negotiation , 2004, IEEE Symposium on Security and Privacy.
[4] Fabio Martinelli. Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems , 2002, MFCS.
[5] Simon N. Foley,et al. Soft Constraints for Security , 2004, VODCA@FOSAD.
[6] Fabio Martinelli,et al. On Relating and Integrating Two Trust Management Frameworks , 2007, VODCA@FOSAD.
[7] Martín Abadi,et al. A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..
[8] Fabio Martinelli,et al. Towards an Integrated Formal Analysis for Security and Trust , 2005, FMOODS.
[9] Roger Dingledine,et al. Privacy enhancing technologies : Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002 : revised papers , 2003 .
[10] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[11] Audun Jøsang,et al. Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..
[12] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[13] Fabio Martinelli,et al. Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques , 1999, TACAS.
[14] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[15] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[16] Marianne Winslett. An Introduction to Automated Trust Establishment , 2002, GI Jahrestagung.
[17] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[18] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.