-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Oct.
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, Oct. 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0003400251
-
-
Technical Report No. ESD-TR-75-306, Electronics Systems Division,AFSC, Manscom AF Base, Bedford, MA
-
D. Bell and L. LaPadula, Secure Computer System: Unified Exposition and the Multics Interpretation. Technical Report No. ESD-TR-75-306, Electronics Systems Division,AFSC, Manscom AF Base, Bedford, MA, 1976.
-
(1976)
Secure Computer System: Unified Exposition and the Multics Interpretation
-
-
Bell, D.1
LaPadula, L.2
-
5
-
-
0003369827
-
NFS version 3 protocol specification
-
Internet Engineering Task Force, Jun.
-
B. Callaghan, B. Pawloski and P. Staubach, NFS Version 3 Protocol Specification. Request for Comments RFC 1813, Internet Engineering Task Force, Jun. 1995.
-
(1995)
RFC
, vol.1813
-
-
Callaghan, B.1
Pawloski, B.2
Staubach, P.3
-
7
-
-
0013294472
-
-
Internet draft draft-ietf-webdav-acl-04, Intnernet Engineering Task Force, Jan.
-
G. Clemm, A. Hopkins, E. Sedlar and J. Whitehead, WebDAV Access Control Protocol. Internet draft draft-ietf-webdav-acl-04, Intnernet Engineering Task Force, Jan. 2001.
-
(2001)
WebDAV Access Control Protocol
-
-
Clemm, G.1
Hopkins, A.2
Sedlar, E.3
Whitehead, J.4
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
Aug.
-
D. Denning, A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5), pages 236-243, Aug. 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
9
-
-
0003337018
-
The TLS protocol
-
Interact Engineering Task Force, Jan.
-
T. Dierks and C. Allen, The TLS Protocol. Request for Comments RFC 2246, Interact Engineering Task Force, Jan. 1999.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
11
-
-
0003237987
-
The Kerberos network authentication service (V5)
-
Internet Engineering Task Force, Sep.
-
J. Kohl and B. C. Neuman. The Kerberos Network Authentication Service (V5). Request for Comments (Proposed Standard) RFC 1510, Internet Engineering Task Force, Sep. 1993.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, B.C.2
-
12
-
-
0002548429
-
The evolution of the Kerberos authentication system
-
IEEE Computer Society Press
-
J. Kohl, B. C. Neuman, and T. Y. T'so. The Evolution of the Kerberos Authentication System. In Distributed Open Systems, pages 78-94. IEEE Computer Society Press, 1994
-
(1994)
Distributed Open Systems
, pp. 78-94
-
-
Kohl, J.1
Neuman, B.C.2
T'so, T.Y.3
-
13
-
-
0013191894
-
-
Interact Draft draft-leach-uuids-guids-01.txt. Interact Engineering Task Force, Feb.
-
P. J. Leach and R. Salz, UUIDs and GUIDs. Interact Draft draft-leach-uuids-guids-01.txt. Interact Engineering Task Force, Feb. 1998.
-
(1998)
UUIDs and GUIDs
-
-
Leach, P.J.1
Salz, R.2
-
14
-
-
0042277157
-
Generic security service API
-
Request For Comments, Interact Engineering Task Force, Sep.
-
J. Linn, Generic Security Service API, Request For Comments RFC 1508, Interact Engineering Task Force, Sep. 1993.
-
(1993)
RFC
, vol.1508
-
-
Linn, J.1
-
17
-
-
0008527287
-
-
Microsoft Corp., Windows 2000 Active Directory, http://www.microsoft.com/widows2000/guide/server/features/directory.asp, 2000.
-
(2000)
Windows 2000 Active Directory
-
-
-
20
-
-
0013301852
-
-
Microsoft Corp., ActiveX Controls, http://microsoft.com/com/tech/activex.asp, 1999.
-
(1999)
ActiveX Controls
-
-
-
21
-
-
0013292141
-
-
Novell Inc., NDS 8. http://www.novell.com/documentation/lg/nds8/docui/index.html, 1999.
-
(1999)
NDS 8
-
-
-
22
-
-
0016082170
-
The UNIX timesharing system
-
Jul.
-
D. Ritchie, and K. Thompson, The UNIX Timesharing System. Communications of the ACM, 17(7), pages 365-375, Jul. 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 365-375
-
-
Ritchie, D.1
Thompson, K.2
-
23
-
-
0016555241
-
The protection of information in computer systems
-
Sep.
-
J. Saltzer and M. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE 63(9), pages 1278-1308, Sep. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
24
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2) pages 38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
25
-
-
0013191898
-
-
Internet Draft draft-ietf-cat-kerberos-set-passwd-03 Internet Engineering Task Force, Apr.
-
M. Swift, J. Trostle, J. Brezak and B. Gossman, Kerberos Set/Change Password: Version 2, Internet Draft draft-ietf-cat-kerberos-set-passwd-03 Internet Engineering Task Force, Apr. 2000.
-
(2000)
Kerberos Set/Change Password: Version 2
-
-
Swift, M.1
Trostle, J.2
Brezak, J.3
Gossman, B.4
|