Up: Design of an Application-Level
Previous: Conclusions
- 1
-
Serge Abiteboul, Richard Hull, and Victor Vianu.
Foundations of Databases.
Addison-Wesley, 1995.
- 2
-
Ross Anderson.
Why cryptosystems fail.
In 1st ACM Conference on Computer and Communications Security,
November 1993.
- 3
-
Ross Anderson.
Making smartcard systems robust.
In Cardis 94, 1994.
- 4
-
Matt Blaze, Joan Feigenbaum, and Jack Lacy.
Decentralized trust management.
In Proceedings of the 17th Symposium on Security and Privacy,
pages 164-173. IEEE Computer Society Press, 1996.
- 5
-
Carl M. Ellison, Bill Frantz, Ron Rivest, and Brian M. Thomas.
SPKI certificate documentation.
http://www.clark.net/pub/cme/html/spki.html.
- 6
-
Carl A. Gunter, Trevor Jim, and Bow-Yaw Wang.
Authenticated data distribution using query certificate managers.
Submitted for publication, 1997.
- 7
-
Butler Lampson and Ron Rivest.
SDSI--a simple distributed security infrastructure.
http://theory.lcs.mit.edu/~cis/sdsi.html.
- 8
-
Paul Resnick and James Miller.
PICS: Internet access controls without censorship.
Communications of the ACM, 39(10):87-93, October 1996.
- 9
-
VeriSign, Inc. home page: www.verisign.com.