[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

On SDSI's linked local name spaces

Published: 01 January 1998 Publication History

Abstract

Rivest and Lampson have recently introduced SDSI, a Simple Distributed Security Infrastructure. One of the important innovations of SDSI is the use of linked local name spaces. This paper suggests a logical explanation of SDSIs local name spaces, as a complement to the operational explanation given in the SDSI definition.

Cited By

View all

Index Terms

  1. On SDSI's linked local name spaces

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Journal of Computer Security
    Journal of Computer Security  Volume 6, Issue 1-2
    Sept. 1998
    125 pages
    ISSN:0926-227X
    Issue’s Table of Contents

    Publisher

    IOS Press

    Netherlands

    Publication History

    Published: 01 January 1998

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Named data networkingACM SIGCOMM Computer Communication Review10.1145/2656877.265688744:3(66-73)Online publication date: 28-Jul-2014
    • (2012)Networking named contentCommunications of the ACM10.1145/2063176.206320455:1(117-124)Online publication date: 1-Jan-2012
    • (2010)SecPAL: Design and semantics of a decentralized authorization languageJournal of Computer Security10.5555/1835408.183541118:4(619-665)Online publication date: 1-Dec-2010
    • (2009)Networking named contentProceedings of the 5th international conference on Emerging networking experiments and technologies10.1145/1658939.1658941(1-12)Online publication date: 1-Dec-2009
    • (2009)Completeness of discovery protocolsProceedings of the 2nd ACM workshop on Assurable and usable security configuration10.1145/1655062.1655070(29-36)Online publication date: 9-Nov-2009
    • (2009)Real life challenges in access-control managementProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1518701.1518838(899-908)Online publication date: 4-Apr-2009
    • (2008)Authorization in trust managementACM Computing Surveys10.1145/1380584.138058740:3(1-48)Online publication date: 13-Aug-2008
    • (2008)A user study of policy creation in a flexible access-control systemProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1357054.1357143(543-552)Online publication date: 6-Apr-2008
    • (2007)Efficient proving for practical distributed access-control systemsProceedings of the 12th European conference on Research in Computer Security10.5555/2393847.2393852(19-37)Online publication date: 24-Sep-2007
    • (2007)Run-time principals in information-flow type systemsACM Transactions on Programming Languages and Systems10.1145/1290520.129052630:1(6-es)Online publication date: 1-Nov-2007
    • Show More Cited By

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media