next up previous
Up: Design of an Application-Level Previous: Conclusions

References

1
Serge Abiteboul, Richard Hull, and Victor Vianu.
Foundations of Databases.
Addison-Wesley, 1995.

2
Ross Anderson.
Why cryptosystems fail.
In 1st ACM Conference on Computer and Communications Security, November 1993.

3
Ross Anderson.
Making smartcard systems robust.
In Cardis 94, 1994.

4
Matt Blaze, Joan Feigenbaum, and Jack Lacy.
Decentralized trust management.
In Proceedings of the 17th Symposium on Security and Privacy, pages 164-173. IEEE Computer Society Press, 1996.

5
Carl M. Ellison, Bill Frantz, Ron Rivest, and Brian M. Thomas.
SPKI certificate documentation.
http://www.clark.net/pub/cme/html/spki.html.

6
Carl A. Gunter, Trevor Jim, and Bow-Yaw Wang.
Authenticated data distribution using query certificate managers.
Submitted for publication, 1997.

7
Butler Lampson and Ron Rivest.
SDSI--a simple distributed security infrastructure.
http://theory.lcs.mit.edu/~cis/sdsi.html.

8
Paul Resnick and James Miller.
PICS: Internet access controls without censorship.
Communications of the ACM, 39(10):87-93, October 1996.

9
VeriSign, Inc. home page:  www.verisign.com.