-
1
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
Boston, MA, December
-
Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, and Roger P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pages 1-14, Boston, MA, December 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
2
-
-
85084162095
-
The CRISIS wide area security architecture
-
San Antonio, TX, January
-
Eshwar Belani, Amin Vahdat, Thomas Anderson, and Michael Dahlin. The CRISIS wide area security architecture. In Proceedings of the 7th USENIX Security Symposium, pages 15-30, San Antonio, TX, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 15-30
-
-
Belani, E.1
Vahdat, A.2
Anderson, T.3
Dahlin, M.4
-
3
-
-
84860959628
-
-
Berkeley DB. http://www.sleepycat.com/.
-
-
-
-
4
-
-
0003563576
-
The Echo distributed file system
-
Digital Systems Research Center, Palo Alto, CA, September
-
Andrew D. Birrell, Andy Hisgen, Chuck Jerian, Timothy Mann, and Garret Swart. The Echo distributed file system. Technical Report 111, Digital Systems Research Center, Palo Alto, CA, September 1993.
-
(1993)
Technical Report
, vol.111
-
-
Birrell, A.D.1
Hisgen, A.2
Jerian, C.3
Mann, T.4
Swart, G.5
-
5
-
-
0022614501
-
A global authentication service without global trust
-
Oakland, CA
-
Andrew D. Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder. A global authentication service without global trust. In Proceedings of the 1986 IEEE Symposium on Security and Privacy, pages 223-230, Oakland, CA, 1986.
-
(1986)
Proceedings of the 1986 IEEE Symposium on Security and Privacy
, pp. 223-230
-
-
Birrell, A.D.1
Lampson, B.W.2
Needham, R.M.3
Schroeder, M.D.4
-
6
-
-
0020118361
-
Grapevine: An exercise in distributed computing
-
April
-
Andrew D. Birrell, Roy Levin, Roger M. Needham, and Michael D. Schroeder. Grapevine: An exercise in distributed computing. Communications of the ACM, 25(4):260-274, April 1982.
-
(1982)
Communications of the ACM
, vol.25
, Issue.4
, pp. 260-274
-
-
Birrell, A.D.1
Levin, R.2
Needham, R.M.3
Schroeder, M.D.4
-
7
-
-
0034502932
-
A national-scale authentication infrastructure
-
R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, and V. Welch. A national-scale authentication infrastructure. IEEE Computer, 33(12):60-66, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 60-66
-
-
Butler, R.1
Engert, D.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
Volmer, J.6
Welch, V.7
-
8
-
-
0003369827
-
NFS version 3 protocol specification
-
Network Working Group, June
-
B. Callaghan, B. Pawlowski, and P. Staubach. NFS version 3 protocol specification. RFC 1813, Network Working Group, June 1995.
-
(1995)
RFC
, vol.1813
-
-
Callaghan, B.1
Pawlowski, B.2
Staubach, P.3
-
10
-
-
0003337018
-
The TLS protocol
-
Network Working Group, January
-
T. Dierks and C. Allen. The TLS protocol. RFC 2246, Network Working Group, January 1999.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
11
-
-
0003358457
-
SPKI certificate theory
-
Network / Working Group, September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. SPKI certificate theory. RFC 2693, Network / Working Group, September 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylönen, T.6
-
12
-
-
21644433904
-
-
Work in progress
-
Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylönen. SPKI certificate documentation. Work in progress, from http://www.pobox.com/~cme/html/spki.html, 2002.
-
(2002)
SPKI Certificate Documentation
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylönen, T.6
-
13
-
-
0003629991
-
-
FIPS 180-1. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
15
-
-
0032218229
-
A security architecture for computational grids
-
San Francisco, CA, November
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational grids. In Proceedings of the 5th ACM Conference on Computer and Communications Security Conference, pages 83-92, San Francisco, CA, November 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security Conference
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
16
-
-
0003229196
-
The SSL protocol version 3.0
-
(draft-freier-ssl-version302.txt), Network Working Group, November. Work in progress
-
Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL protocol version 3.0. Internet draft (draft-freier-ssl-version302.txt), Network Working Group, November 1996. Work in progress.
-
(1996)
Internet Draft
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
17
-
-
0003339136
-
The digital distributed system security architecture
-
Baltimore, MD, October. URL citeseer.nj.nee. com/gasser89digital.html
-
Morrie Gasser, Andy Goldstein, Charlie Kaufman, and Butler Lampson. The Digital distributed system security architecture. In Proceedings of the 12th NIST-NCSC National Computer Security Conference, pages 305-319, Baltimore, MD, October 1989. URL citeseer.nj.nee. com/gasser89digital.html.
-
(1989)
Proceedings of the 12th NIST-NCSC National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
18
-
-
0023964787
-
Scale and performance in a distributed file system
-
February
-
John H. Howard, Michael L. Kazar, Sherri G. Menees, David A. Nichols, M. Satyanarayanan, Robert N. Side-botham, and Michael J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6(1):51-81, February 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard, J.H.1
Kazar, M.L.2
Menees, S.G.3
Nichols, D.A.4
Satyanarayanan, M.5
Side-Botham, R.N.6
West, M.J.7
-
20
-
-
84860958750
-
REX: Secure, modular remote execution through file descriptor passing
-
MIT Laboratory for Computer Science, January
-
Michael Kaminsky, Eric Peterson, Kevin Fu, David Mazières, and M. Frans Kaashoek. REX: Secure, modular remote execution through file descriptor passing. Technical Report MIT-LCS-TR-884, MIT Laboratory for Computer Science, January 2003.
-
(2003)
Technical Report
, vol.MIT-LCS-TR-884
-
-
Kaminsky, M.1
Peterson, E.2
Fu, K.3
Mazières, D.4
Kaashoek, M.F.5
-
21
-
-
0034440650
-
Oceanstore: An architecture for global-scale persistent storage
-
November
-
John Kubiatowicz, David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Christopher Wells, and Ben Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 190-201, November 2000.
-
(2000)
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Eaton, P.4
Geels, D.5
Gummadi, R.6
Rhea, S.7
Weatherspoon, H.8
Weimer, W.9
Wells, C.10
Zhao, B.11
-
22
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Butler Lampson, Martin Abadi, Michael Burrows, and Edward P. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.P.4
-
23
-
-
0042352260
-
Separating key management from file system security
-
Kiawah Island, SC
-
David Mazières, Michael Kaminsky, M. Frans Kaashoek, and Emmett Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles, pages 124-139, Kiawah Island, SC, 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Kaashoek, M.F.3
Witchel, E.4
-
25
-
-
21644432386
-
Secure and flexible global file sharing
-
San Antonio, TX, June
-
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John Ioannidis, Angelos D. Keromytis, and Jonathan M. Smith. Secure and flexible global file sharing. In Proceedings of the USENIX 2003 Annual Technical Conference, Freenix Track, pages 165-178, San Antonio, TX, June 2003.
-
(2003)
Proceedings of the USENIX 2003 Annual Technical Conference, Freenix Track
, pp. 165-178
-
-
Miltchev, S.1
Prevelakis, V.2
Ioannidis, S.3
Ioannidis, J.4
Keromytis, A.D.5
Smith, J.M.6
-
27
-
-
85084160341
-
Capability file names: Separating authorisation from user management in an internet file system
-
Washington, D.C.
-
Jude Regan and Christian Jensen. Capability file names: Separating authorisation from user management in an internet file system. In Proceedings of the 10th USENIX Security Symposium, pages 221-234, Washington, D.C., 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 221-234
-
-
Regan, J.1
Jensen, C.2
-
30
-
-
0005363354
-
RFC: Remote procedure call protocol specification version 2
-
Network Working Group, August
-
R. Srinivasan. RFC: Remote procedure call protocol specification version 2. RFC 1831, Network Working Group, August 1995.
-
(1995)
RFC
, vol.1831
-
-
Srinivasan, R.1
-
31
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX, February
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX, pages 191-202, Dallas, TX, February 1988.
-
(1988)
Proceedings of the Winter 1988 USENIX
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
32
-
-
1542379505
-
-
PhD thesis, Department of Computer Science, University of California, Berkeley, December
-
Amin Vahdat. Operating System Services for Wide-Area Applications. PhD thesis, Department of Computer Science, University of California, Berkeley, December 1998.
-
(1998)
Operating System Services for Wide-area Applications
-
-
Vahdat, A.1
-
34
-
-
0028380781
-
Authentication in the Taos operating system
-
Edward P. Wobber, Martin Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.P.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
36
-
-
0041915634
-
-
X.509. ITU-T (formerly CCITT) Information technology Open Systems Interconnection, December
-
X.509. Recommendation X.509: The Directory Authentication Framework. ITU-T (formerly CCITT) Information technology Open Systems Interconnection, December 1988.
-
(1988)
Recommendation X.509: The Directory Authentication Framework
-
-
-
37
-
-
85084164692
-
SSH - Secure login connections over the Internet
-
San Jose, CA, July
-
Tatu Ylönen. SSH - secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37-42, San Jose, CA, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 37-42
-
-
Ylönen, T.1
|