PAPERS FOR INFS 767 LECTURE 7, FALL 2001
- Perlman, R. An overview of PKI trust models. IEEE
Network , Volume: 13
Issue: 6 , Nov.-Dec. 1999. Page(s):
38 –43
- Hayes, J.M. The problem with
multiple roots in Web browsers-certificate masquerading. Proceedings
Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative
Enterprises, 1998. (WET ICE '98).
Page(s): 306 –311.
- Hayes, J.M. Restricting Access with Certificate
Attributes in Multiple Root Environments -A Recipe for Certificate
Masquerading. Proceedings 17th Annual Computer
Security Applications Conference, December
10-14, 2001.
Not yet available in IEEE digital library. You are not expected to read this paper
during the semester.
- Joon
Park and Ravi Sandhu, “Binding
Identities and Attributes Using Digitally Signed Certificates.” Proc. 16th Annual Computer Security Applications
Conference, New Orleans, Louisiana, December 11-15, 2000, pages
120-127. Available in IEEE Digital
Library or at local
link.
On-campus and off-campus access to ACM Digital Library,
IEEE/IEE Electronic Library and Springer LINK is available to all GMU
students. Links to these libraries are
conveniently available at http://oscr.gmu.edu/sql/subdb.php?Engineering_&_Technology
For LNCS go to Springer Link -> OnLine Libraries ->
Computer Science.