From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 90fc50a8bc4202e2ae718ac5e042e6683607d6390f69b24840e90ba907ee5ae6
Message ID: <199610010301.DAA25739@pipe3.ny2.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-10-01 05:24:41 UTC
Raw Date: Tue, 1 Oct 1996 13:24:41 +0800
From: jya@pipeline.com (John Young)
Date: Tue, 1 Oct 1996 13:24:41 +0800
To: cypherpunks@toad.com
Subject: DIMACS Abstracts
Message-ID: <199610010301.DAA25739@pipe3.ny2.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
We offer the ABSTRACTS of the presentations at:
DIMACS Workshop on Trust Management in Networks
September 30 - October 2, 1996
South Plainfield, NJ
http://jya.com/dimacs.txt (80 kb)
ftp://jya.com/pub/incoming/dimacs.txt
Sorry, no E-mail.
Here are the titles and authors:
_________________________________________________________
Let A Thousand (Ten Thousand?) CAs Reign
Stephen Kent, BBN Corporation
_________________________________________________________
The PolicyMaker Approach to Trust Management
Matt Blaze, Joan Feigenbaum, and Jack Lacy, AT&T
Laboratories
_________________________________________________________
SDSI -- A Simple Distributed Security Infrastructure
Butler Lampson and Ron Rivest, Microsoft and MIT
_________________________________________________________
SPKI Certificates
Carl Ellison, Cybercash
_________________________________________________________
Using PICS Labels for Trust Management
Rohit Khare
_________________________________________________________
Managing Trust in an Information-Labeling System
M. Blaze (1), J. Feigenbaum (1), P. Resnick (1), M.
Strauss (2),
1. AT&T Laboratories
2. AT&T Laboratories and Iowa State University
_________________________________________________________
Trust Management In Web Browsers, Present and Future
Drew Dean, Edward W. Felten, and Dan Wallach, Princeton
University
_________________________________________________________
IBM Cryptolopes, SuperDistribution and Digital Rights
Management
Marc A. Kaplan, IBM
_________________________________________________________
Requirements and Approaches for Electronic Licenses
David Maher, AT&T Laboratories
_________________________________________________________
PathServer
Michael Reiter and Stuart Stubblebine, AT&T Laboratories
_________________________________________________________
Inferno Security
David Presotto, Bell Labs, Lucent Technologies
_________________________________________________________
Transparent Internet E-mail Security
Raph Levien, Lewis McCarthy, and Matt Blaze, AT&T
Laboratories
_________________________________________________________
Cryptographically Secure Digital Time-Stamping to Support
Trust Management
Stuart Haber and Scott Stornetta, Bellcore and Surety
Technologies (respectively)
_________________________________________________________
Untrusted Third Parties: Key Management for the Prudent
Mark Lomas and Bruno Crispo, Cambridge University
_________________________________________________________
Distributed Commerce Transactions: Structuring
Multi-Party Exchanges into Pair-wise Exchanges
Steven Ketchpel and Hector Garcia-Molina, Stanford
University
_________________________________________________________
Policy-Controlled Cryptographic Key Release
Dennis K. Branstad and David A. McGrew, Trusted
Information Systems, Inc.
_________________________________________________________
An X.509v3 Based Public-key Infrastructure for the
Federal Government
William Burr, National Institute of Standards and
Technology
_________________________________________________________
The ICE-TEL Public-Key Infrastructure and Trust Model
David W. Chadwick [1], University of Salford
_________________________________________________________
A Distributed Trust Model
Alfarez Abdul-Rahman and Stephen Hailes, University
College, London
_________________________________________________________
On Multiple Statements from Trusted Sources
Raphael Yahalom, Hebrew University and MIT
_________________________________________________________
Off-line Delegation in a Distributed File Repository
Arne Helme and Tage Stabell-Kulo, University of Twente
and University of Troms
_________________________________________________________
Operational Tradeoffs of Aggregating Attributes in
Digital Certificates
Ian Simpson, Carnegie Mellon University
_________________________________________________________
Trust Management for Mobile Agents
William M. Farmer, Joshua D. Guttman, and Vipin Swarup,
MITRE
_________________________________________________________
Trust Management in ERLink
Samuel I. Schaen, Mitre
_________________________________________________________
Linking trust with network reliability
Yvo Desmedt and Mike Burmester, University of Wisconsin
at Milwaukee and Royal Holloway College
_________________________________________________________
Trust Management Under Law-Governed Interaction
Naftaly H. Minsky and Victoria Ungureanu, Rutgers
University
_________________________________________________________
Tools for Security Policy Definition and Implementation
P. Humenn, BlackWatch Technology, Inc.
_________________________________________________________
http://jya.com/dimacs.txt (80 kb)
ftp://jya.com/pub/incoming/dimacs.txt
Sorry, no E-mail of this one.
Return to October 1996
Return to “jya@pipeline.com (John Young)”
1996-10-01 (Tue, 1 Oct 1996 13:24:41 +0800) - DIMACS Abstracts - jya@pipeline.com (John Young)