Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
139 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI using first-order logic. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
SPKT, SDSI, Trust, Logic programs, management, Language, Logic |
139 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI Using First-Order Logic. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
131 | Ninghui Li |
Local Names in SPKI/SDSI. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
SDSI, access control, logic programming, authorization, security policies, trust management, SPKI |
123 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
100 | Arul Ganesh, K. Gopinath |
SPKI/SDSI certificate chain discovery with generic constraints. |
Bangalore Compute Conf. |
2008 |
DBLP DOI BibTeX RDF |
WPDS, certificate chain, validity specification, security, policy, SPKI/SDSI |
100 | Somesh Jha, Thomas W. Reps |
Analysis of SPKI/SDSI Certificates Using Model Checking. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
91 | Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, Hiroshi G. Okuno |
Privacy-Enhanced SPKI Access Control on PKIX and Its Application to Web Server . |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
91 | Joseph Y. Halpern, Ron van der Meyden |
A Logical Reconstruction of SPKI. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
75 | Michelle S. Wangham, Emerson Ribeiro de Mello, Joni da Silva Fraga, Davi da Silva Böger |
A Model to support SPKI Federations management through XKMS. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
75 | Mads Dam |
Regular SPKI. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
72 | Alessandro Bassi, Julien Laganier |
Towards an IPv6-Based Security Framework for Distributed Storage Resources. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
IBP, authorization certificates, CBID, IPv6, IPsec, CGA, SPKI |
72 | Vitaly Shmatikov |
Probabilistic Analysis of Anonymity. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
59 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 |
Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust. |
SELMAS |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero |
Extending the SDSI / SPKI Model through Federation Webs. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno |
Privacy-Enhanced Access Control by SPKI and Its Application to Web Server. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
|
56 | Guillermo Navarro 0001, Joan Borrell, Jose A. Ortega-Ruiz, Sergi Robles |
Access control with safe role assignment for mobile agents. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
security, access control, mobile agents, SPKI |
56 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
48 | Emerson Ribeiro de Mello, Joni da Silva Fraga, Altair Olivo Santin, Frank Siqueira |
Building Trust Chains between CORBA Objects. |
LADC |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Altair Olivo Santin, Joni da Silva Fraga, Frank Siqueira, Emerson Ribeiro de Mello |
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems. |
SRDS |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Jeom Goo Kim, Do Hyeon Lee |
An Access Control Using SPKI Certificate in Peer-to-Peer Environment. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
Simple Public Key Infrastructure, Peer-to-Peer Environment |
44 | Yong Ma, Yumin Tian |
The Coarse-Grained Computing P2P Algorithm Based on SPKI. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | YoungLok Lee, HyungHyo Lee, Seungyong Lee 0001, HeeMan Park, BongNam Noh |
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Jon Howell, David Kotz |
A Formal Semantics for SPKI. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
40 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
40 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. |
Inf. Syst. Frontiers |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
40 | Urs Hengartner, Peter Steenkiste |
Implementing access control to people location information. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
trust, rsa, location, certificates, delegation, dsa, spki/sdsi |
40 | Refik Molva, Yves Roudier |
A Distributed Access Control Model for Java. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
Java, distribution, capabilities, access control model, SPKI |
32 | Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, Dejvuth Suwimonteerabuth |
SDSIrep: A Reputation System Based on SDSI. |
TACAS |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Katia Hristova, K. Tuncay Tekle, Yanhong A. Liu |
Efficient trust management policy analysis from rules. |
PPDP |
2007 |
DBLP DOI BibTeX RDF |
security, algorithm, access control, time complexity, policy analysis |
32 | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps |
Weighted Pushdown Systems and Trust-Management Systems. |
TACAS |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Jin-Bum Hwang, Jong Wook Han |
A Security Model for Home Networks with Authority Delegation. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Sanna Liimatainen |
Usability of Decentralized Authorization Systems - A Comparative Study. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Tadashi Komori, Takamichi Saito |
A Secure Wireless LAN System Retaining Privacy. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Ilari Lehti, Pekka Nikander |
Certifying Trust. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison |
SPKI. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Dominik Wojtczak |
Trust Metrics for the SPKI/SDSI Authorisation Framework. |
ATVA |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Dejvuth Suwimonteerabuth |
Computing Minimum-Height Certificate Trees in SPKI/SDSI. |
IICS |
2010 |
DBLP BibTeX RDF |
|
28 | Mokdong Chung, Jaehyuk Choi 0005, Kiyeal Lee, Shi-Kook Rhyoo |
Constructing Enterprise Application Framework for Secure RFID Application Using SPKI/SDSI. |
ALPIT |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Arun K. Eamani, A. Prasad Sistla |
Language based policy analysis in a SPKI Trust Management System. |
J. Comput. Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
28 | José de R. P. Braga Jr., Alexandre Ceasar Tavares Vidal, Fabio Kon, Marcelo Finger |
Trust in large-scale computational grids: an SPKI/SDSI extension for representing opinion. |
MGC@Middleware |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison |
SPKI/SDSI. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Somesh Jha, Thomas W. Reps |
Model checking SPKI/SDSI. |
J. Comput. Secur. |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Sidharth Nazareth, Sean W. Smith |
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth. |
ICWI |
2004 |
DBLP BibTeX RDF |
|
28 | Joseph Y. Halpern, Ron van der Meyden |
A Logical Reconstruction of SPKI. |
J. Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Mads Dam |
Regular SPKI (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Joseph Y. Halpern, Ron van der Meyden |
A logical reconstruction of SPKI |
CoRR |
2002 |
DBLP BibTeX RDF |
|
28 | Yki Kortesniemi |
SPKI Performance and Certificate Chain Reduction. |
GI Jahrestagung |
2002 |
DBLP BibTeX RDF |
|
28 | Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest |
Certificate Chain Discovery in SPKI/SDSI. |
J. Comput. Secur. |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Yki Kortesniemi, Tero Hasu, Jonna Särs |
A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems. |
NDSS |
2000 |
DBLP BibTeX RDF |
|
28 | Takamichi Saito, Kentaro Umesawa, Hiroshi G. Okuno |
Privacy enhanced access control by SPKI. |
ICPADS Workshops |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison, Bill Frantz, Butler W. Lampson, Ron Rivest, Brian Thomas, Tatu Ylönen |
SPKI Certificate Theory. |
RFC |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Carl M. Ellison |
SPKI Requirements. |
RFC |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Carl M. Ellison, Steve Dohrmann |
Public-key support for group collaboration. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
S/MIME, SDSI, PKI, Human-computer interface, IPsec, PGP, SSH, SPKI |
16 | Ladislav Huraj, Vladimír Siládi |
Authorization through trust chains in ad hoc grids. |
EATIS |
2009 |
DBLP DOI BibTeX RDF |
certificate chain, authorization, delegation, ad hoc grid |
16 | Karl Krukow, Mogens Nielsen |
Trust structures. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Trust structures, Denotational and operational semantics, Trust management, I/O automata, Foundations |
16 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier Esparza |
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains. |
ATVA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee 0001, HyungHyo Lee |
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. |
SUTC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Lauri I. W. Pesonen, David M. Eyers, Jean Bacon |
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems. |
SAINT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Lauri I. W. Pesonen, Jean Bacon |
Secure event types in content-based, multi-domain publish/subscribe systems. |
SEM |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Julien Laganier, Pascale Vicat-Blanc Primet |
HIPernet: a decentralized security infrastructure for large scale grid environments. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Michelle S. Wangham, Joni da Silva Fraga, Ricardo Schmidt, Ricardo J. Rabelo |
MASS: A Mobile Agent Security Scheme for the Creation of Virtual Enterprises. |
MATA |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Klaus Herrmann 0001, Michael A. Jaeger |
PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai |
Certificate-based authorization policy in a PKI environment. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
XML, Public key infrastructure, digital certificates |
16 | Trevor Perrin |
Public key distribution through "cryptoIDs". |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
cryptoIDs, key management, fingerprints, key distribution, public key infrastructure |
16 | Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest |
Proxy-based security protocols in networked mobile devices. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
certificate chain, certificate chain discovery, security, protocol, mobile device, wireless, authorization, certificate, ubiquitous, proxy, pervasive |
16 | Guillermo Navarro 0001, Sergi Robles, Joan Borrell |
Role-Based Access Control for E-commerce Sea-of-Data Applications. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yuh-Jong Hu |
Some thoughts on agent trust and delegation. |
Agents |
2001 |
DBLP DOI BibTeX RDF |
XML |
16 | Stephen Weeks |
Understanding Trust Management Systems. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
AMBAR Protocol: Access Management Based on Authorization Reduction. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Himanshu Khurana, Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Dirk Balfanz, Drew Dean, Mike Spreitzer |
A Security Infrastructure for Distributed Java Applications. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
Access Control Logics, Security, Java, Access Control, Distributed Computing |
16 | Andrew W. Appel, Edward W. Felten |
Proof-Carrying Authentication. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Pekka Nikander, Yki Kortesniemi, Jonna Partanen |
Preserving Privacy in Distributed Delegation with Fast Certificates. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Rolf Oppliger |
Authorization Methods for E-Commerce Applications. |
SRDS |
1999 |
DBLP DOI BibTeX RDF |
|