메뉴 건너뛰기




Volumn 7, Issue 3, 1989, Pages 247-280

Integrating Security in a Large Distributed System

Author keywords

Access lists; AFS; Andrew; Needham Schroeder; negative rights; orange book; protection domain; RPC; scalability; trust; UNIX

Indexed keywords

COMPUTERS, PERSONAL; CRYPTOGRAPHY;

EID: 0024714097     PISSN: 07342071     EISSN: 15577333     Source Type: Journal    
DOI: 10.1145/65000.65002     Document Type: Article
Times cited : (120)

References (38)
  • 4
    • 0022015288 scopus 로고
    • Secure communication using remote procedure calls
    • (Feb.)
    • Blrrell, A. D. Secure communication using remote procedure calls. ACM Trans. Comput. Syst. 3, 1 (Feb. 1985), 1–14.
    • (1985) ACM Trans. Comput. Syst. 3 , vol.1 , pp. 1-14
    • Blrrell, A.D.1
  • 5
    • 0004215976 scopus 로고
    • Tech. Rep. 39, Digital Equipment Corporation, Systems Research Center, Palo Alto, Calif., Feb.
    • Burrows, M. L., Abadi, M., and Needham, R. N. A logic of authentication. Tech. Rep. 39, Digital Equipment Corporation, Systems Research Center, Palo Alto, Calif., Feb. 1989.
    • (1989) A logic of authentication
    • Burrows, M.L.1    Abadi, M.2    Needham, R.N.3
  • 6
    • 85051442694 scopus 로고
    • The distributed V kernel and its performance for diskless workstations
    • (Bretten Woods, N.H., Oct. 11-13, 1983). ACM, New York
    • Cheriton, D. R., and Zwaenepoel, W. The distributed V kernel and its performance for diskless workstations. In Proceedings of the 9th Symposium on Operating System Principles (Bretten Woods, N.H., Oct. 11-13, 1983). ACM, New York, 1983 pp. 129–140.
    • (1983) Proceedings of the 9th Symposium on Operating System Principles , pp. 129-140
    • Cheriton, D.R.1    Zwaenepoel, W.2
  • 9
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • (Mar.)
    • Diffie, W., and Hellman, M. E. Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 3 (Mar. 1979), 397–427.
    • (1979) Proc. IEEE 67 , vol.3 , pp. 397-427
    • Diffie, W.1    Hellman, M.E.2
  • 10
    • 84962290765 scopus 로고
    • CSC-STD-001-83, Dept. of Defense, Computer Security Center
    • DoD. Trusted Computer System Evaluation Criteria. CSC-STD-001-83, Dept. of Defense, Computer Security Center, 1985.
    • (1985) Trusted Computer System Evaluation Criteria
  • 11
    • 60649097500 scopus 로고
    • Extending the UNIX protection model with access control lists
    • (Summer)
    • Fernandez, G., and Allen, L. Extending the UNIX protection model with access control lists. In Usenix Conference Proceedings (Summer, 1988).
    • (1988) Usenix Conference Proceedings
    • Fernandez, G.1    Allen, L.2
  • 12
    • 0021510842 scopus 로고
    • Unix operating system security
    • (Oct.)
    • Grampp, F. T., and Morris, R. H. Unix operating system security. Bell Lab. Tech. J. 63, 8 (Oct. 1984), 1649–1672.
    • (1984) Bell Lab. Tech. J. 63 , vol.8 , pp. 1649-1672
    • Grampp, F.T.1    Morris, R.H.2
  • 16
    • 3743154925 scopus 로고
    • Ph.D. dissertation, Dept. of Computer Science, Carnegie Mellon Univ., Pittsburgh, Pa.
    • Jones, A. K. Protection in programmed systems. Ph.D. dissertation, Dept. of Computer Science, Carnegie Mellon Univ., Pittsburgh, Pa., 1973.
    • (1973) Protection in programmed systems
    • Jones, A.K.1
  • 17
    • 0016564957 scopus 로고
    • Towards the design of secure systems
    • Jones, A. K., and Wulf, W. A. Towards the design of secure systems. Softw. Pract. Exper. 5 (1975), 321–336.
    • (1975) Softw. Pract. Exper. , vol.5 , pp. 321-336
    • Jones, A.K.1    Wulf, W.A.2
  • 18
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • (Oct.)
    • Lampson, B. W. A note on the confinement problem. Commun. ACM 16, 10 (Oct. 1973), 613–614.
    • (1973) Commun. ACM 16 , vol.10 , pp. 613-614
    • Lampson, B.W.1
  • 22
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • (Dec.)
    • Needham, R. M., and Schroeder, M. D. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993–998.
    • (1978) Commun. ACM 21 , vol.12 , pp. 993-998
    • Needham, R.M.1    Schroeder, M.D.2
  • 25
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in Multics
    • (July)
    • Saltzer, J. H. Protection and the control of information sharing in Multics. Commun. ACM 17, 7 (July 1974), 388–402.
    • (1974) Commun. ACM 17 , vol.7 , pp. 388-402
    • Saltzer, J.H.1
  • 26
    • 84976853655 scopus 로고
    • Tech. Rep. CMU-ITC-84-005, Information Technology Center, Carnegie Mellon Univ., Pittsburgh, Pa., Aug.
    • Satyanarayanan, M. Users, groups and access lists: An implementor's guide. Tech. Rep. CMU-ITC-84-005, Information Technology Center, Carnegie Mellon Univ., Pittsburgh, Pa., Aug. 1984.
    • (1984) Users, groups and access lists: An implementor's guide
    • Satyanarayanan, M.1
  • 28
    • 84976793914 scopus 로고
    • Tech. Rep. CMU-ITC-84-038, Information Technology Center, Carnegie Mellon Univ., Pittsburgh, Pa., (revised).
    • Satyanarayanan, M. RPC2 User Manual. Tech. Rep. CMU-ITC-84-038, Information Technology Center, Carnegie Mellon Univ., Pittsburgh, Pa., 1986 (revised).
    • (1986) RPC2 User Manual
    • Satyanarayanan, M.1
  • 29
    • 0043001177 scopus 로고
    • Volumes: The Andrew file system data structuring primitive
    • (Aug.). Also available as Tech. Rep. CMU-ITC-053, Information Technology Center, Carnegie Mellon Univ., Pittsburgh, Pa., 1986.
    • Sidebotham, R. N. Volumes: The Andrew file system data structuring primitive. In European Unix User Group Conference Proceedings (Aug. 1986). Also available as Tech. Rep. CMU-ITC-053, Information Technology Center, Carnegie Mellon Univ., Pittsburgh, Pa., 1986.
    • (1986) European Unix User Group Conference Proceedings
    • Sidebotham, R.N.1
  • 30
    • 0004001033 scopus 로고
    • Wide area file service and the AFS experimental system
    • (Mar.)
    • Spector, A. Z., and Kazar, M. L. Wide area file service and the AFS experimental system. Unix Rev. 7, 3 (Mar. 1989).
    • (1989) Unix Rev. 7 , vol.3
    • Spector, A.Z.1    Kazar, M.L.2
  • 32
    • 84976693603 scopus 로고
    • Secure networking in the Sun environment
    • (Atlanta, Ga., Summer)
    • Taylor, B. Secure networking in the Sun environment. In Usenix Conference Proceedings (Atlanta, Ga., Summer, 1986).
    • (1986) Usenix Conference Proceedings
    • Taylor, B.1
  • 33
    • 84976848200 scopus 로고
    • A framework for network security
    • (Spring)
    • Taylor, B. A framework for network security. SunTechnology 1, 2 (Spring 1988).
    • (1988) SunTechnology 1 , vol.2
    • Taylor, B.1
  • 34
    • 84969337256 scopus 로고
    • Federal Information Processing Standards Publication, FIPS PUB 46.
    • U.S. Department of Commerce, N.B.S., Data Encryption Standard. 1977. Federal Information Processing Standards Publication, FIPS PUB 46.
    • (1977) Data Encryption Standard
  • 35
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • (June)
    • Voydock, V. L., and Kent, S. T. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (June 1983), 135–171.
    • (1983) ACM Comput. Surv. 15 , vol.2 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.