[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
DIMACS Abstracts
We offer the ABSTRACTS of the presentations at:
DIMACS Workshop on Trust Management in Networks
September 30 - October 2, 1996
South Plainfield, NJ
http://jya.com/dimacs.txt (80 kb)
ftp://jya.com/pub/incoming/dimacs.txt
Sorry, no E-mail.
Here are the titles and authors:
_________________________________________________________
Let A Thousand (Ten Thousand?) CAs Reign
Stephen Kent, BBN Corporation
_________________________________________________________
The PolicyMaker Approach to Trust Management
Matt Blaze, Joan Feigenbaum, and Jack Lacy, AT&T
Laboratories
_________________________________________________________
SDSI -- A Simple Distributed Security Infrastructure
Butler Lampson and Ron Rivest, Microsoft and MIT
_________________________________________________________
SPKI Certificates
Carl Ellison, Cybercash
_________________________________________________________
Using PICS Labels for Trust Management
Rohit Khare
_________________________________________________________
Managing Trust in an Information-Labeling System
M. Blaze (1), J. Feigenbaum (1), P. Resnick (1), M.
Strauss (2),
1. AT&T Laboratories
2. AT&T Laboratories and Iowa State University
_________________________________________________________
Trust Management In Web Browsers, Present and Future
Drew Dean, Edward W. Felten, and Dan Wallach, Princeton
University
_________________________________________________________
IBM Cryptolopes, SuperDistribution and Digital Rights
Management
Marc A. Kaplan, IBM
_________________________________________________________
Requirements and Approaches for Electronic Licenses
David Maher, AT&T Laboratories
_________________________________________________________
PathServer
Michael Reiter and Stuart Stubblebine, AT&T Laboratories
_________________________________________________________
Inferno Security
David Presotto, Bell Labs, Lucent Technologies
_________________________________________________________
Transparent Internet E-mail Security
Raph Levien, Lewis McCarthy, and Matt Blaze, AT&T
Laboratories
_________________________________________________________
Cryptographically Secure Digital Time-Stamping to Support
Trust Management
Stuart Haber and Scott Stornetta, Bellcore and Surety
Technologies (respectively)
_________________________________________________________
Untrusted Third Parties: Key Management for the Prudent
Mark Lomas and Bruno Crispo, Cambridge University
_________________________________________________________
Distributed Commerce Transactions: Structuring
Multi-Party Exchanges into Pair-wise Exchanges
Steven Ketchpel and Hector Garcia-Molina, Stanford
University
_________________________________________________________
Policy-Controlled Cryptographic Key Release
Dennis K. Branstad and David A. McGrew, Trusted
Information Systems, Inc.
_________________________________________________________
An X.509v3 Based Public-key Infrastructure for the
Federal Government
William Burr, National Institute of Standards and
Technology
_________________________________________________________
The ICE-TEL Public-Key Infrastructure and Trust Model
David W. Chadwick [1], University of Salford
_________________________________________________________
A Distributed Trust Model
Alfarez Abdul-Rahman and Stephen Hailes, University
College, London
_________________________________________________________
On Multiple Statements from Trusted Sources
Raphael Yahalom, Hebrew University and MIT
_________________________________________________________
Off-line Delegation in a Distributed File Repository
Arne Helme and Tage Stabell-Kulo, University of Twente
and University of Troms
_________________________________________________________
Operational Tradeoffs of Aggregating Attributes in
Digital Certificates
Ian Simpson, Carnegie Mellon University
_________________________________________________________
Trust Management for Mobile Agents
William M. Farmer, Joshua D. Guttman, and Vipin Swarup,
MITRE
_________________________________________________________
Trust Management in ERLink
Samuel I. Schaen, Mitre
_________________________________________________________
Linking trust with network reliability
Yvo Desmedt and Mike Burmester, University of Wisconsin
at Milwaukee and Royal Holloway College
_________________________________________________________
Trust Management Under Law-Governed Interaction
Naftaly H. Minsky and Victoria Ungureanu, Rutgers
University
_________________________________________________________
Tools for Security Policy Definition and Implementation
P. Humenn, BlackWatch Technology, Inc.
_________________________________________________________
http://jya.com/dimacs.txt (80 kb)
ftp://jya.com/pub/incoming/dimacs.txt
Sorry, no E-mail of this one.