Back to Results
First PageMeta Content
Logical consequence / Reasoning / Datalog / Rule of inference / Knowledge base / Proof theory / Logic / Propositional calculus / Inference


Confidentiality-preserving Proof Theories for Distributed Proof Systems Kazuhiro Minami Nikita Borisov
Add to Reading List

Document Date: 2013-01-05 00:32:19


Open Document

File Size: 436,09 KB

Share Result on Facebook

City

New York / Washington / DC / Berlin / Datalog / /

Company

Distributed Systems / Cambridge University Press / Access-Control Systems / ACM Press / TI / /

Country

Japan / United States / China / /

Currency

pence / USD / /

/

Facility

Distributed Proof Systems Kazuhiro Minami Nikita Borisov Marianne Winslett National Institute of Informatics University of Illinois / Urbana-Champaign University of Illinois / /

IndustryTerm

authorization systems / cryptographic proving protocol / pervasive computing systems / trust management systems / trust management / logic-based authorization systems / immediate consequence operator / alternate systems / proof construction systems / proof systems / cryptographic protocol / credential systems / /

Organization

Cambridge University / National Science Foundation / Ministry of Internal Affairs and Communications in Japan / University of Pittsburgh / University of Illinois / Distributed Proof Systems Kazuhiro Minami Nikita Borisov Marianne Winslett National Institute / IEEE Computer Society / /

Person

Andrew W. Appel / Edward W. Felten / John DeTreville / Scott Garriss / David Kotz / Oded Goldreich / Adam J. Lee / Marianne Winslett / Lujo Bauer / Georg Gottlob / William H. Winsborough / Trevor Jim / Benjamin N. Grosof / Piero A. Bonatti / Michael K. Reiter / Cedric Fournet / John C. Mitchell / Algorithm / Letizia Tanca / Yuri Gurevich / Nikita Borisov / Joan Feigenbaum / Charles C. Zhang / Stefano Ceri / Ninghui Li / David Sutherland / Moritz Y. Becker / Kazuhiro Minami / Itay Neeman / Andrew D. Gordon / Kazuhiro Minami Nikita Borisov Marianne / /

Position

Protection General / model / security model / computational model for distributed proof systems / Private / /

ProgrammingLanguage

DC / /

ProvinceOrState

New York / /

Technology

PKI / cryptographic proving protocol / private key / Mobile Devices / encryption / Cryptography / commutative encryption / public key / public-key encryption / outermost encryption / nested encryption / Mobile Computing / /

SocialTag