ACM Transactions on Computer Systems (TOCS)
Network security via private-key certificates
ACM SIGOPS Operating Systems Review
Hardware speedups in long integer multiplication
SPAA '90 Proceedings of the second annual ACM symposium on Parallel algorithms and architectures
Exponentiation cryptosystems on the IBM PC
IBM Systems Journal
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Authentication and Delegation with Smart-cards
TACS '91 Proceedings of the International Conference on Theoretical Aspects of Computer Software
The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
ACM SIGOPS Operating Systems Review
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Authentication in the Taos operating system
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Endorsements, licensing, and insurance for distributed system services
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
A Secure Group Membership Protocol
IEEE Transactions on Software Engineering
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
An authentication logic supporting synchronization, revocation, and recency
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Access control for large collections
ACM Transactions on Information Systems (TOIS)
Security functions for a file repository
ACM SIGOPS Operating Systems Review
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
Authentication services for computer networks and electronic messaging systems
ACM SIGOPS Operating Systems Review
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Role and task-based access control in the PerDiS groupware platform
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
High-confidence design for security: don't trust—verify
Communications of the ACM
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Security versus performance tradeoffs in RPC implementations for safe language systems
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
SAFKASI: a security mechanism for language-based systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Some thoughts on agent trust and delegation
Proceedings of the fifth international conference on Autonomous agents
Architectural support for copy and tamper resistant software
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Trust: benefits, models, and mechanisms
Secure Internet programming
Providing policy-neutral and transparent access control in extensible systems
Secure Internet programming
Secure Internet programming
Secure Internet programming
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
Security requirements for cooperative work: a model and its system implications
EW 6 Proceedings of the 6th workshop on ACM SIGOPS European workshop: Matching operating systems to application needs
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency
IEEE Transactions on Software Engineering
Secure implementation of channel abstractions
Information and Computation
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
Autonomous Agents and Multi-Agent Systems
Computer
Java Security: Present and Near Future
IEEE Micro
An Architecture for Survivable Coordination in Large Distributed Systems
IEEE Transactions on Knowledge and Data Engineering
Optimization of the Establishment of Secure Communication Channels in Wireless Mobile Networks
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
IAuth: An authentication system for Internet applications
COMPSAC '97 Proceedings of the 21st International Computer Software and Applications Conference
Authenticated Operation of Open Computing Devices
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
MAAMAW '99 Proceedings of the 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World: MultiAgent System Engineering
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach
COORDINATION '00 Proceedings of the 4th International Conference on Coordination Languages and Models
Delegation of Responsibility (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Revised Papers from the 8th International Workshop on Security Protocols
Review and Revocation of Access Privileges Distributed with PKI Certificates
Revised Papers from the 8th International Workshop on Security Protocols
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
The Open-End Argument for Private Computing
HUC '99 Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing
Authentication for Mobile Agents
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
Mobile Agents and Security
Validating a Web service security abstraction by typing
Proceedings of the 2002 ACM workshop on XML security
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Logic for SDSI's Linked Local Name Spaces: Preliminary Version
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A Secure Distributed Search System
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
Role-based security for distributed object systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Design of enterprise-wide secure networked system
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Teaching secure communication protocols using a game representation
ACE '03 Proceedings of the fifth Australasian conference on Computing education - Volume 20
Computer
Outcomes-based assessment as an assurance education tool
Security education and critical infrastructures
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
Decentralized user authentication in a global file system
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Implementing an untrusted operating system on trusted hardware
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
Computer Security in the Real World
Computer
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trustworthy 100-year digital objects: Evidence after every witness is dead
ACM Transactions on Information Systems (TOIS)
Access control systems: from host-centric to network-centric computing
IBM Systems Journal
Role-based System Administration or Who, What, Where, and How
LISA '93 Proceedings of the 7th USENIX conference on System administration
Firmato: A novel firewall management toolkit
ACM Transactions on Computer Systems (TOCS)
Distributed Computing
Theoretical Computer Science - Special issue: Foundations of wide area network computing
A rule-based framework for role-based constrained delegation
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Credentials and Beliefs in Remote Trusted Platforms Attestation
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Access control in a core calculus of dependency
Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming
Fundamenta Informaticae - Deontic Logic in Computer Science
Access Control in a Core Calculus of Dependency
Electronic Notes in Theoretical Computer Science (ENTCS)
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
Model Driven Development of Security Aspects
Electronic Notes in Theoretical Computer Science (ENTCS)
A group-based authorization model for cooperative systems
ECSCW'97 Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work
Singularity: rethinking the software stack
ACM SIGOPS Operating Systems Review - Systems work at Microsoft Research
REX: secure, extensible remote execution
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Access control in a world of software diversity
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Providing authentication to messages signed with a smart card in hostile environments
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
SNP: an interface for secure network programming
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Authorizing applications in singularity
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Journal of Parallel and Distributed Computing
Type-based cryptographic operations
Journal of Computer Security - Special issue on CSFW15
Trust-enhanced Security in Location-based Adaptive Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
Delegating responsibility in digital systems: Horton's "who done it?"
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Towards a declarative language and system for secure networking
NETB'07 Proceedings of the 3rd USENIX international workshop on Networking meets databases
Network service sharing infrastructure: service authentication and authorization revocation
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Practical Techniques for Operating System Attestation
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Trusted Computing Serving an Anonymity Service
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Variations in Access Control Logic
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
Protecting Information Sharing in Distributed Collaborative Environment
Advanced Web and NetworkTechnologies, and Applications
Security in Distributed Applications
Advances in Software Engineering
Access Control of Federated Information Systems
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Fine-grained access control for GridFTP using SecPAL
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Tiered fault tolerance for long-term integrity
FAST '09 Proccedings of the 7th conference on File and storage technologies
Validation of GCC optimizers through trace generation
Software—Practice & Experience
Trading-off security and performance in barrier slicing for remote software entrusting
Automated Software Engineering
Trust Management and Trust Negotiation in an Extension of SQL
Trustworthy Global Computing
xDomain: cross-border proofs of access
Proceedings of the 14th ACM symposium on Access control models and technologies
Trust Enhanced Authorization for Mobile Agents
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Formal anonymity models for efficient privacy-preserving joins
Data & Knowledge Engineering
A Mechanism for Identity Delegation at Authentication Level
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Distributed programming with distributed authorization
Proceedings of the 5th ACM SIGPLAN workshop on Types in language design and implementation
Policy-based access control for weakly consistent replication
Proceedings of the 5th European conference on Computer systems
A practical study on security of agent-based ubiquitous computing
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hiding names: private authentication in the applied pi calculus
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Policies and proofs for code auditing
ATVA'07 Proceedings of the 5th international conference on Automated technology for verification and analysis
How to do things with cryptographic protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Misbehaviors detection to ensure availability in OLSR
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A modal deconstruction of access control logics
FOSSACS'08/ETAPS'08 Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures
TAPIDO: trust and authorization via provenance and integrity in distributed objects
ESOP'08/ETAPS'08 Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems
SecureBlox: customizable secure distributed data processing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
A framework towards enhancing trust and authorisation for e-commerce service
International Journal of Internet Technology and Secured Transactions
User-centric handling of identity agent compromise
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Hardware enforcement of application security policies using tagged memory
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Towards a data-centric view of cloud security
CloudDB '10 Proceedings of the second international workshop on Cloud data management
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
Programming cryptographic protocols
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Problems with same origin policy: know thyself
Security'08 Proceedings of the 16th International conference on Security protocols
A conditional constructive logic for access control and its sequent calculus
TABLEAUX'11 Proceedings of the 20th international conference on Automated reasoning with analytic tableaux and related methods
Digital identity security architecture in Ethos
Proceedings of the 7th ACM workshop on Digital identity management
Privacy preserving indexing for eHealth information networks
Proceedings of the 20th ACM international conference on Information and knowledge management
Lightweight mobile agent authentication scheme for home network environments
CIS'04 Proceedings of the First international conference on Computational and Information Science
A security-oriented task scheduler for heterogeneous distributed systems
HiPC'06 Proceedings of the 13th international conference on High Performance Computing
Transitive trust in mobile scenarios
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
PDTM: a policy-driven trust management framework in distributed systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Role-Based delegation with negative authorization
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
SP'04 Proceedings of the 12th international conference on Security Protocols
An authorization framework based on constrained delegation
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Public-key cryptography and availability
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
A modal logic for role-based access control
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Towards more controllable and practical delegation
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
A survey of security issue in multi-agent systems
Artificial Intelligence Review
Principles for Computer System Design
ACM Turing award lectures
Access rights – the keys to cooperative work/learning
MIS'04 Proceedings of the 2004 international conference on Metainformatics
Reducing the dependence of SPKI/SDSI on PKI
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Privacy-aware proof-carrying authorization
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security
Minimizing the TCB for securing SCADA systems
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Weighted pushdown systems and trust-management systems
TACAS'06 Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Securing information gateways with derivation-constrained access control
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Towards a theory of trust in networks of humans and computers
SP'11 Proceedings of the 19th international conference on Security Protocols
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Memory-mapping support for reducer hyperobjects
Proceedings of the twenty-fourth annual ACM symposium on Parallelism in algorithms and architectures
Composable IO: a novel resource sharing platform in personal Clouds
The Journal of Supercomputing
A proof-carrying file system with revocable and use-once certificates
STM'11 Proceedings of the 7th international conference on Security and Trust Management
New modalities for access control logics: permission, control and ratification
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Fundamenta Informaticae - Deontic Logic in Computer Science
Automatic OS kernel TCB reduction by leveraging compile-time configurability
HotDep'12 Proceedings of the Eighth USENIX conference on Hot Topics in System Dependability
Efficient proving for practical distributed access-control systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Declarative secure distributed information systems
Computer Languages, Systems and Structures
Optimizing Storage Performance for VM-Based Mobile Computing
ACM Transactions on Computer Systems (TOCS)
Embassies: radically refactoring the web
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Lightweight server support for browser-based CSRF protection
Proceedings of the 22nd international conference on World Wide Web
Global authentication in an untrustworthy world
HotOS'13 Proceedings of the 14th USENIX conference on Hot Topics in Operating Systems
Patterns for building dependable systems with trusted bases
Proceedings of the 17th Conference on Pattern Languages of Programs
Belief semantics of authorization logic
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
MinimaLT: minimal-latency networking through better security
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Stateful authorization logic --Proof theory and a case study
Journal of Computer Security - STM'10
Toward strong, usable access control for shared distributed data
FAST'14 Proceedings of the 12th USENIX conference on File and Storage Technologies
Hi-index | 0.02 |
We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a “speaks for” relation between principals. A simple principal either has a name or is a communication channel; a compound principal can express an adopted role or delegated authority. The theory shows how to reason about a principal's authority by deducing the other principals that it can speak for; authenticating a channel is one important application. We use the theory to explain many existing and proposed security mechanisms. In particular, we describe the system we have built. It passes principals efficiently as arguments or results of remote procedure calls, and it handles public and shared key encryption, name lookup in a large name space, groups of principals, program loading, delegation, access control, and revocation.