|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 64 occurrences of 37 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
338 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI using first-order logic. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
SPKT, SDSI, Trust, Logic programs, management, Language, Logic |
338 | Ninghui Li, John C. Mitchell |
Understanding SPKI/SDSI Using First-Order Logic. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
255 | Ninghui Li |
Local Names in SPKI/SDSI. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
SDSI, access control, logic programming, authorization, security policies, trust management, SPKI |
254 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
205 | Arul Ganesh, K. Gopinath |
SPKI/SDSI certificate chain discovery with generic constraints. |
Bangalore Compute Conf. |
2008 |
DBLP DOI BibTeX RDF |
WPDS, certificate chain, validity specification, security, policy, SPKI/SDSI |
205 | Somesh Jha, Thomas W. Reps |
Analysis of SPKI/SDSI Certificates Using Model Checking. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
148 | Vitaly Shmatikov |
Probabilistic Analysis of Anonymity. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
certificate-chain discovery, certificate-set analysis, model checking, authorization, naming, pushdown system, SPKI/SDSI |
132 | Joseph Y. Halpern, Ron van der Meyden |
A Logical Reconstruction of SPKI. |
CSFW |
2001 |
DBLP DOI BibTeX RDF |
|
123 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
123 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro, Galeno A. Jung, Elizabeth Fernandes 0001 |
Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust. |
SELMAS |
2003 |
DBLP DOI BibTeX RDF |
|
115 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
99 | Emerson Ribeiro de Mello, Joni da Silva Fraga, Altair Olivo Santin, Frank Siqueira |
Building Trust Chains between CORBA Objects. |
LADC |
2003 |
DBLP DOI BibTeX RDF |
|
90 | YoungLok Lee, HyungHyo Lee, Seungyong Lee 0001, HeeMan Park, BongNam Noh |
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Urs Hengartner, Peter Steenkiste |
Access control to people location information. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI |
82 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. |
Inf. Syst. Frontiers |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
82 | Urs Hengartner, Peter Steenkiste |
Implementing access control to people location information. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
trust, rsa, location, certificates, delegation, dsa, spki/sdsi |
82 | Michelle S. Wangham, Emerson Ribeiro de Mello, Joni da Silva Fraga, Davi da Silva Böger |
A Model to support SPKI Federations management through XKMS. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
66 | Ahmed Bouajjani, Javier Esparza, Stefan Schwoon, Dejvuth Suwimonteerabuth |
SDSIrep: A Reputation System Based on SDSI. |
TACAS |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Katia Hristova, K. Tuncay Tekle, Yanhong A. Liu |
Efficient trust management policy analysis from rules. |
PPDP |
2007 |
DBLP DOI BibTeX RDF |
security, algorithm, access control, time complexity, policy analysis |
66 | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps |
Weighted Pushdown Systems and Trust-Management Systems. |
TACAS |
2006 |
DBLP DOI BibTeX RDF |
|
66 | Sanna Liimatainen |
Usability of Decentralized Authorization Systems - A Comparative Study. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro |
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems. |
Communications and Multimedia Security |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Dominik Wojtczak |
Trust Metrics for the SPKI/SDSI Authorisation Framework. |
ATVA |
2011 |
DBLP DOI BibTeX RDF |
|
57 | Dejvuth Suwimonteerabuth |
Computing Minimum-Height Certificate Trees in SPKI/SDSI. |
IICS |
2010 |
DBLP BibTeX RDF |
|
57 | Mokdong Chung, Jaehyuk Choi 0005, Kiyeal Lee, Shi-Kook Rhyoo |
Constructing Enterprise Application Framework for Secure RFID Application Using SPKI/SDSI. |
ALPIT |
2007 |
DBLP DOI BibTeX RDF |
|
57 | José de R. P. Braga Jr., Alexandre Ceasar Tavares Vidal, Fabio Kon, Marcelo Finger |
Trust in large-scale computational grids: an SPKI/SDSI extension for representing opinion. |
MGC@Middleware |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Carl M. Ellison |
SPKI/SDSI. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Somesh Jha, Thomas W. Reps |
Model checking SPKI/SDSI. |
J. Comput. Secur. |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Sidharth Nazareth, Sean W. Smith |
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth. |
ICWI |
2004 |
DBLP BibTeX RDF |
|
57 | Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest |
Certificate Chain Discovery in SPKI/SDSI. |
J. Comput. Secur. |
2001 |
DBLP DOI BibTeX RDF |
|
49 | Jin-Bum Hwang, Jong Wook Han |
A Security Model for Home Networks with Authority Delegation. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Dejvuth Suwimonteerabuth, Stefan Schwoon, Javier Esparza |
Efficient Algorithms for Alternating Pushdown Systems with an Application to the Computation of Certificate Chains. |
ATVA |
2006 |
DBLP DOI BibTeX RDF |
|
33 | InSu Kim, HeeMan Park, BongNam Noh, YoungLok Lee, Seungyong Lee 0001, HyungHyo Lee |
Design and Implementation of Context-Awareness Simulation Toolkit for Context learning. |
SUTC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Michelle S. Wangham, Joni da Silva Fraga, Ricardo Schmidt, Ricardo J. Rabelo |
MASS: A Mobile Agent Security Scheme for the Creation of Virtual Enterprises. |
MATA |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest |
Proxy-based security protocols in networked mobile devices. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
certificate chain, certificate chain discovery, security, protocol, mobile device, wireless, authorization, certificate, ubiquitous, proxy, pervasive |
33 | Yuh-Jong Hu |
Some thoughts on agent trust and delegation. |
Agents |
2001 |
DBLP DOI BibTeX RDF |
XML |
33 | Andrew W. Appel, Edward W. Felten |
Proof-Carrying Authentication. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|