Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
Revised Papers from the 8th International Workshop on Security Protocols
A General and Flexible Access-Control System for the Web
Proceedings of the 11th USENIX Security Symposium
A Logic for SDSI's Linked Local Name Spaces: Preliminary Version
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Analysis of SPKI/SDSI Certificates Using Model Checking
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Logical Reconstruction of SPKI
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A State-Transition Model of Trust Management and Access Control
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A logical reconstruction of SPKI
Journal of Computer Security - Special issue on CSFW14
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Towards a credential-based implementation of compound access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Trust but verify: authorization for web services
SWS '04 Proceedings of the 2004 workshop on Secure web service
Specifying distributed trust management in LolliMon
Proceedings of the 2006 workshop on Programming languages and analysis for security
Agents for e-business applications
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Trust in large-scale computational grids: an SPKI/SDSI extension for representing opinion
Proceedings of the 4th international workshop on Middleware for grid computing
Efficient trust management policy analysis from rules
Proceedings of the 9th ACM SIGPLAN international conference on Principles and practice of declarative programming
A type discipline for authorization policies
ACM Transactions on Programming Languages and Systems (TOPLAS) - Special Issue ESOP'05
Run-time principals in information-flow type systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Journal of Computer Security - Special issue on CSFW15
A user study of policy creation in a flexible access-control system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Real life challenges in access-control management
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Completeness of discovery protocols
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Proceedings of the 5th international conference on Emerging networking experiments and technologies
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Communications of the ACM
A type discipline for authorization policies
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
Weighted pushdown systems and trust-management systems
TACAS'06 Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Efficient proving for practical distributed access-control systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.02 |
Rivest and Lampson have recently introduced SDSI, a SimpleDistributed Security Infrastructure. One of the importantinnovations of SDSI is the use of linked local name spaces. Thispaper suggests a logical explanation of SDSIs local name spaces, asa complement to the operational explanation given in the SDSIdefinition.