Authentication metric analysis and design

作者: Michael K. Reiter , Stuart G. Stubblebine

DOI: 10.1145/317087.317088

关键词:

摘要: … In addition, the Beth-Borcherding-Klein and Reiter-Stubblebine metrics are not limited to public key infrastructures, but for simplicity we describe them in this context only. We describe …

参考文章(29)
William Stallings, Protect your privacy: a guide for PGP users Prentice-Hall, Inc.. ,(1995)
Virgil D. Gligor, Joseph N. Pato, Shyh-Wei Luan, On Inter-RealmAuthentication in Large Distributed Systems ieee symposium on security and privacy. pp. 2- ,(1992)
Butler Lampson, Morrie Gasser, Andy Goldstein, Charlie Kaufman, The Digital Distributed System Security Architecture National Institute of Standards and Technology. ,(1989)
Ueli Maurer, Modelling a Public-Key Infrastructure european symposium on research in computer security. pp. 325- 350 ,(1996) , 10.1007/3-540-61770-1_45
Thomas Beth, Malte Borcherding, Birgit Klein, Valuation of Trust in Open Networks european symposium on research in computer security. pp. 3- 18 ,(1994) , 10.1007/3-540-58618-0_53
Anas Tarah, Christian Huitema, Associating Metrics to Certification Paths european symposium on research in computer security. pp. 175- 189 ,(1992) , 10.1007/BFB0013898
Thomas Beth, Raphael Yahalom, Birgit Klein, Trust-based navigation in distributed systems Computing Systems. ,vol. 7, pp. 45- 73 ,(1994)
Alexander Aiken, Raph Levien, Attack-resistant trust metrics for public key certification usenix security symposium. pp. 18- 18 ,(1998)
Collin I'Anson, Chris Mitchell, Security defects in CCITT recommendation X.509 ACM SIGCOMM Computer Communication Review. ,vol. 20, pp. 30- 34 ,(1990) , 10.1145/378570.378623
V. King, S. Rao, R. Tarjan, A faster deterministic maximum flow algorithm symposium on discrete algorithms. ,vol. 17, pp. 157- 164 ,(1992) , 10.1006/JAGM.1994.1044