Security analysis of cryptographically controlled access to XML documents
From MaRDI portal
Publication:3546366
DOI10.1145/1346330.1346331zbMATH Open1311.94103OpenAlexW2064764499WikidataQ130893460 ScholiaQ130893460MaRDI QIDQ3546366FDOQ3546366
Martín Abadi, Bogdan Warinschi
Publication date: 21 December 2008
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.1962
Cited In (8)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Sound and complete computational interpretation of symbolic hashes in the standard model
- XML security protection scheme based on Kerberos authentication and polynomials authorization
- Universally Composable Cryptographic Role-Based Access Control
- A survey of symbolic methods in computational analysis of cryptographic systems
Recommendations
This page was built for publication: Security analysis of cryptographically controlled access to XML documents
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3546366)