Size: 361
Comment:
|
Size: 803
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 5: | Line 5: |
Remarks: |
|
Line 7: | Line 9: |
Paper: A Practically Implementable and Tractable Delegation Logic Biblio: N. Li, B. Grosof, and J. Feigenbaum, "A Practically Implementable and Tractable Delegation Logic," to appear in Proceedings of the 2000 IEEE Symposium on Security and Privacy. Remarks: * Good writing * Based on plain datalog * Uses OLP inference engines * Discusses tractability * NO DISCUSSION of constraints or CDBs ---- |
Paper: Distributed Credential Chain Discovery in Trust Management
BIBLIO: Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management (extended abstract). In Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 156--165. ACM Press, November 2001.
Remarks:
Paper: A Practically Implementable and Tractable Delegation Logic
Biblio: N. Li, B. Grosof, and J. Feigenbaum, "A Practically Implementable and Tractable Delegation Logic," to appear in Proceedings of the 2000 IEEE Symposium on Security and Privacy.
Remarks:
- Good writing
- Based on plain datalog
- Uses OLP inference engines
- Discusses tractability
- NO DISCUSSION of constraints or CDBs