Understanding SPKI/SDSI using first-order logic
- 8 June 2005
- journal article
- Published by Springer Nature in International Journal of Information Security
- Vol. 5 (1) , 48-64
- https://doi.org/10.1007/s10207-005-0073-0
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Analysis of SPKI/SDSI certificates using model checkingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Decentralized trust managementPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On the structure of delegation networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Local names in SPKI/SDSIPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Formal Semantics for SPKIPublished by Springer Nature ,2000
- Constraint Query LanguagesJournal of Computer and System Sciences, 1995
- Constraint logic programming: a surveyThe Journal of Logic Programming, 1994
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- Linear-time algorithms for testing the satisfiability of propositional horn formulaeThe Journal of Logic Programming, 1984