1996-10-01 - DIMACS Abstracts

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 90fc50a8bc4202e2ae718ac5e042e6683607d6390f69b24840e90ba907ee5ae6
Message ID: <199610010301.DAA25739@pipe3.ny2.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-10-01 05:24:41 UTC
Raw Date: Tue, 1 Oct 1996 13:24:41 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Tue, 1 Oct 1996 13:24:41 +0800
To: cypherpunks@toad.com
Subject: DIMACS Abstracts
Message-ID: <199610010301.DAA25739@pipe3.ny2.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   We offer the ABSTRACTS of the presentations at: 
  
   DIMACS Workshop on Trust Management in Networks 
   September 30 - October 2, 1996 
   South Plainfield, NJ 
 
 
   http://jya.com/dimacs.txt  (80 kb) 
 
 
   ftp://jya.com/pub/incoming/dimacs.txt 
 
 
   Sorry, no E-mail. 
 
 
   Here are the titles and authors: 
 
   _________________________________________________________ 
 
   Let A Thousand (Ten Thousand?) CAs Reign 
 
   Stephen Kent, BBN Corporation 
 
   _________________________________________________________ 
 
   The PolicyMaker Approach to Trust Management 
 
   Matt Blaze, Joan Feigenbaum, and Jack Lacy, AT&T 
   Laboratories 
 
   _________________________________________________________ 
 
   SDSI -- A Simple Distributed Security Infrastructure 
 
   Butler Lampson and Ron Rivest, Microsoft and MIT 
 
   _________________________________________________________ 
 
   SPKI Certificates 
 
   Carl Ellison, Cybercash 
 
   _________________________________________________________ 
 
   Using PICS Labels for Trust Management 
 
   Rohit Khare 
 
   _________________________________________________________ 
 
   Managing Trust in an Information-Labeling System 
 
   M. Blaze (1), J. Feigenbaum (1), P. Resnick (1), M. 
   Strauss (2), 
   1. AT&T Laboratories 
   2. AT&T Laboratories and Iowa State University 
 
   _________________________________________________________ 
 
   Trust Management In Web Browsers, Present and Future 
 
   Drew Dean, Edward W. Felten, and Dan Wallach, Princeton 
   University 
 
   _________________________________________________________ 
 
   IBM Cryptolopes, SuperDistribution and Digital Rights 
   Management 
 
   Marc A. Kaplan, IBM 
 
   _________________________________________________________ 
 
   Requirements and Approaches for Electronic Licenses 
 
   David Maher, AT&T Laboratories 
 
   _________________________________________________________ 
 
   PathServer 
 
   Michael Reiter and Stuart Stubblebine, AT&T Laboratories 
 
   _________________________________________________________ 
 
   Inferno Security 
 
   David Presotto, Bell Labs, Lucent Technologies 
 
   _________________________________________________________ 
 
   Transparent Internet E-mail Security 
 
   Raph Levien, Lewis McCarthy, and Matt Blaze, AT&T 
   Laboratories 
 
   _________________________________________________________ 
 
   Cryptographically Secure Digital Time-Stamping to Support 
   Trust Management 
 
   Stuart Haber and Scott Stornetta, Bellcore and Surety 
   Technologies (respectively) 
 
   _________________________________________________________ 
 
   Untrusted Third Parties: Key Management for the Prudent 
 
   Mark Lomas and Bruno Crispo, Cambridge University 
 
   _________________________________________________________ 
 
   Distributed Commerce Transactions: Structuring 
   Multi-Party Exchanges into Pair-wise Exchanges 
 
   Steven Ketchpel and Hector Garcia-Molina, Stanford 
   University 
 
   _________________________________________________________ 
 
   Policy-Controlled Cryptographic Key Release 
 
   Dennis K. Branstad and David A. McGrew, Trusted 
   Information Systems, Inc. 
 
   _________________________________________________________ 
 
   An X.509v3 Based Public-key Infrastructure for the 
   Federal Government 
 
   William Burr, National Institute of Standards and 
   Technology 
 
   _________________________________________________________ 
 
   The ICE-TEL Public-Key Infrastructure and Trust Model 
 
   David W. Chadwick [1], University of Salford 
 
   _________________________________________________________ 
 
   A Distributed Trust Model 
 
   Alfarez Abdul-Rahman and Stephen Hailes, University 
   College, London 
 
   _________________________________________________________ 
 
   On Multiple Statements from Trusted Sources 
 
   Raphael Yahalom, Hebrew University and MIT 
 
   _________________________________________________________ 
 
   Off-line Delegation in a Distributed File Repository 
 
   Arne Helme and Tage Stabell-Kulo, University of Twente 
   and University of Troms 
 
   _________________________________________________________ 
 
   Operational Tradeoffs of Aggregating Attributes in 
   Digital Certificates 
 
   Ian Simpson, Carnegie Mellon University 
 
   _________________________________________________________ 
 
   Trust Management for Mobile Agents 
 
   William M. Farmer, Joshua D. Guttman, and Vipin Swarup, 
   MITRE 
 
   _________________________________________________________ 
 
   Trust Management in ERLink 
 
   Samuel I. Schaen, Mitre 
 
   _________________________________________________________ 
 
   Linking trust with network reliability 
 
   Yvo Desmedt and Mike Burmester, University of Wisconsin 
   at Milwaukee and Royal Holloway College 
 
   _________________________________________________________ 
 
   Trust Management Under Law-Governed Interaction 
 
   Naftaly H. Minsky and Victoria Ungureanu, Rutgers 
   University 
 
   _________________________________________________________ 
 
   Tools for Security Policy Definition and Implementation 
 
   P. Humenn, BlackWatch Technology, Inc. 
 
   _________________________________________________________ 
 
 
   http://jya.com/dimacs.txt  (80 kb) 
 
   ftp://jya.com/pub/incoming/dimacs.txt 
 
 
   Sorry, no E-mail of this one. 
 
 
 
 
 
 





Thread