
We offer the ABSTRACTS of the presentations at: DIMACS Workshop on Trust Management in Networks September 30 - October 2, 1996 South Plainfield, NJ http://jya.com/dimacs.txt (80 kb) ftp://jya.com/pub/incoming/dimacs.txt Sorry, no E-mail. Here are the titles and authors: _________________________________________________________ Let A Thousand (Ten Thousand?) CAs Reign Stephen Kent, BBN Corporation _________________________________________________________ The PolicyMaker Approach to Trust Management Matt Blaze, Joan Feigenbaum, and Jack Lacy, AT&T Laboratories _________________________________________________________ SDSI -- A Simple Distributed Security Infrastructure Butler Lampson and Ron Rivest, Microsoft and MIT _________________________________________________________ SPKI Certificates Carl Ellison, Cybercash _________________________________________________________ Using PICS Labels for Trust Management Rohit Khare _________________________________________________________ Managing Trust in an Information-Labeling System M. Blaze (1), J. Feigenbaum (1), P. Resnick (1), M. Strauss (2), 1. AT&T Laboratories 2. AT&T Laboratories and Iowa State University _________________________________________________________ Trust Management In Web Browsers, Present and Future Drew Dean, Edward W. Felten, and Dan Wallach, Princeton University _________________________________________________________ IBM Cryptolopes, SuperDistribution and Digital Rights Management Marc A. Kaplan, IBM _________________________________________________________ Requirements and Approaches for Electronic Licenses David Maher, AT&T Laboratories _________________________________________________________ PathServer Michael Reiter and Stuart Stubblebine, AT&T Laboratories _________________________________________________________ Inferno Security David Presotto, Bell Labs, Lucent Technologies _________________________________________________________ Transparent Internet E-mail Security Raph Levien, Lewis McCarthy, and Matt Blaze, AT&T Laboratories _________________________________________________________ Cryptographically Secure Digital Time-Stamping to Support Trust Management Stuart Haber and Scott Stornetta, Bellcore and Surety Technologies (respectively) _________________________________________________________ Untrusted Third Parties: Key Management for the Prudent Mark Lomas and Bruno Crispo, Cambridge University _________________________________________________________ Distributed Commerce Transactions: Structuring Multi-Party Exchanges into Pair-wise Exchanges Steven Ketchpel and Hector Garcia-Molina, Stanford University _________________________________________________________ Policy-Controlled Cryptographic Key Release Dennis K. Branstad and David A. McGrew, Trusted Information Systems, Inc. _________________________________________________________ An X.509v3 Based Public-key Infrastructure for the Federal Government William Burr, National Institute of Standards and Technology _________________________________________________________ The ICE-TEL Public-Key Infrastructure and Trust Model David W. Chadwick [1], University of Salford _________________________________________________________ A Distributed Trust Model Alfarez Abdul-Rahman and Stephen Hailes, University College, London _________________________________________________________ On Multiple Statements from Trusted Sources Raphael Yahalom, Hebrew University and MIT _________________________________________________________ Off-line Delegation in a Distributed File Repository Arne Helme and Tage Stabell-Kulo, University of Twente and University of Troms _________________________________________________________ Operational Tradeoffs of Aggregating Attributes in Digital Certificates Ian Simpson, Carnegie Mellon University _________________________________________________________ Trust Management for Mobile Agents William M. Farmer, Joshua D. Guttman, and Vipin Swarup, MITRE _________________________________________________________ Trust Management in ERLink Samuel I. Schaen, Mitre _________________________________________________________ Linking trust with network reliability Yvo Desmedt and Mike Burmester, University of Wisconsin at Milwaukee and Royal Holloway College _________________________________________________________ Trust Management Under Law-Governed Interaction Naftaly H. Minsky and Victoria Ungureanu, Rutgers University _________________________________________________________ Tools for Security Policy Definition and Implementation P. Humenn, BlackWatch Technology, Inc. _________________________________________________________ http://jya.com/dimacs.txt (80 kb) ftp://jya.com/pub/incoming/dimacs.txt Sorry, no E-mail of this one.