Oblivious Signature-Based Envelope
Ninghui Li, Wenliang Du, and Dan Boneh.
Invited submission to the journal Distributed Computing,
special issue of selected papers of PODC 2003. Supercedes
[C03e]
[C03e]
Oblivious Signature-Based Envelope.
Ninghui Li, Wenliang Du, and Dan Boneh.
In Proceedings of the 22nd ACM Symposium on Principles of Distributed
Computing (PODC 2003), pp.
Boston, Massachusetts, July 2003. ACM Press, New York, New York, pp. 182--189.
(Paper in PDF)
[C03d]
Understanding SPKI/SDSI
Using First-Order Logic
Ninghui Li and John C. Mitchell.
In Proceedings of the 16th IEEE Computer Security Foundations Workshop,
Pacific Grove, California, June 2003. IEEE Computer Society Press,
Los Alamitos, California, pp. 89--103.
(Paper in PDF)
[C03b]
RT: A Role-based Trust-management
Framework.
Ninghui Li and John C. Mitchell.
In Proceedings of The Third DARPA Information Survivability Conference and
Exposition (DISCEX III), Washington, D.C., April 2003.
IEEE Computer Society Press,
Los Alamitos, California, pp. 201--212.
(Paper in PDF)
[C02b]
Towards Practical Automated
Trust Negotiation.
William H. Winsborough and Ninghui Li.
In Proceedings of the Third International Workshop on Policies for
Distributed Systems and Networks (POLICY 2002), Monterey, California,
June 2002. IEEE Computer Society Press, Los Alamitos, California,
pp. 92-103.
(Paper in PDF)
[C01b]
Distributed Credential Chain
Discovery in Trust Management (Extended Abstract).
Ninghui Li, William H. Winsborough, and John C. Mitchell.
In Proceedings of the 8th ACM Conference on Computer and
Communications Security (CCS-8),
Philadelphia,
Pennsylvania, November 2001. ACM Press, New York, New York,
pp. 156-165.
Superseded by [J2].
[C00b]
Local Names In SPKI/SDSI.
Ninghui Li.
In Proceedings of the 13th IEEE Computer Security Foundations
Workshop (CSFW-13), Cambridge, UK, July 2000. IEEE Computer
Society Press, Los Alamitos, California, pp. 2-15.
(Paper in PDF)
[C00a]
A Practically Implementable and
Tractable Delegation Logic.
Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum.
In Proceedings of the 2000 IEEE Symposium on Security and Privacy,
Berkeley, California, May 2000. IEEE Computer Society Press, Los Alamitos,
California, pp. 27-42.
Superseded by [J1].