DMCA
Delegation Logic: A Logic-based Approach to Distributed Authorization (2000)
Cached
Download Links
- [ebusiness.mit.edu]
- [www.mit.edu]
- [www.mit.edu]
- [web.mit.edu]
- [www.cs.yale.edu]
- [cs-www.cs.yale.edu]
- [www.mit.edu]
- [cs-www.cs.yale.edu]
- [cs.nyu.edu]
- [cs.nyu.edu]
- [cs.nyu.edu]
- [www.cs.yale.edu]
- [www.cs.yale.edu]
- [crypto.stanford.edu]
- [www.cs.nyu.edu]
- [www.cs.nyu.edu]
- [www.cs.purdue.edu]
- [theory.stanford.edu]
- [crypto.stanford.edu]
- [crypto.stanford.edu]
- [www1.cs.columbia.edu]
- [www.cs.purdue.edu]
- [theory.stanford.edu]
- [www.cs.purdue.edu]
- [crypto.stanford.edu]
- [www1.cs.columbia.edu]
- [crypto.stanford.edu]
- [cs-www.cs.yale.edu]
- [web.cacs.louisiana.edu]
- [www.cacs.louisiana.edu]
- [digital.mit.edu]
- [ebusiness.mit.edu]
- [ebusiness.mit.edu]
- [ebusiness.mit.edu]
- [digital.mit.edu]
- [ebiz.mit.edu]
- DBLP
Other Repositories/Bibliography
by
Ninghui Li
,
Benjamin N. Grosof
,
Joan Feigenbaum
Venue: | ACM Transactions on Information and System Security |
Citations: | 243 - 14 self |