PAPERS FOR INFS 767 LECTURE 7, FALL 2001

 

  1. Perlman, R.  An overview of PKI trust models.  IEEE Network , Volume: 13 Issue: 6 , Nov.-Dec. 1999.  Page(s): 38 –43
  2. Hayes, J.M. The problem with multiple roots in Web browsers-certificate masquerading.  Proceedings Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1998. (WET ICE '98).  Page(s): 306 –311.
  3. Hayes, J.M. Restricting Access with Certificate Attributes in Multiple Root Environments -A Recipe for Certificate Masquerading.  Proceedings 17th Annual Computer Security Applications Conference, December 10-14, 2001.

Not yet available in IEEE digital library.  You are not expected to read this paper during the semester.

  1. Joon Park and Ravi Sandhu, “Binding Identities and Attributes Using Digitally Signed Certificates.”  Proc. 16th Annual Computer Security Applications Conference, New Orleans, Louisiana, December 11-15, 2000, pages 120-127.  Available in IEEE Digital Library or at local link.

 

On-campus and off-campus access to ACM Digital Library, IEEE/IEE Electronic Library and Springer LINK is available to all GMU students.  Links to these libraries are conveniently available at http://oscr.gmu.edu/sql/subdb.php?Engineering_&_Technology

For LNCS go to Springer Link -> OnLine Libraries -> Computer Science.