Author:
Li Ninghui,Mitchell John C.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference30 articles.
1. Abadi, M.: On SDSI's linked local name spaces. J. Comp. Sec. 6(1–2), 3–21 (1998)
2. Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Prog. Lang. Syst. 15(4), 706–734 (1993)
3. Aura, T.: On the structure of delegation networks. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop, pp. 14–26. IEEE Computer Society Press (1998)
4. Bandmann, O., Dam, M.: A note on SPKI's authorization syntax. In: Pre-Proceedings of 1st Annual PKI Research Workshop (2002) Available from http://www.cs.dartmouth.edu/~pki02/
5. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust-management system, version 2. IETF RFC 2704, Sept (1999)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. No Root Store Left Behind;Proceedings of the 22nd ACM Workshop on Hot Topics in Networks;2023-11-28
2. All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23
3. Survey of certificate usage in distributed access control;Computers & Security;2014-07
4. Access Control;Computing Handbook, Third Edition;2014-05-08
5. Two Semantics of Trust Management Language with Negation;Journal of Telecommunications and Information Technology;2013-12-30