-
4
-
-
0027810202
-
The process group approach to reliable distributed computing
-
K. P. Birman. The Process Group Approach to Reliable Distributed Computing. Communications of the ACM, 36(12):37-53, 1993.
-
(1993)
Communications of the ACM
, vol.36
, Issue.12
, pp. 37-53
-
-
Birman, K.P.1
-
5
-
-
84976814834
-
Lightweight causal and atomic group multicast
-
K. P. Birman et al. Lightweight Causal and Atomic Group Multicast. ACM Trans. on Computer Systems, 9(3):272-314, 1991.
-
(1991)
ACM Trans. on Computer Systems
, vol.9
, Issue.3
, pp. 272-314
-
-
Birman, K.P.1
-
6
-
-
84987193155
-
Exploiting virtual synchrony in distributed systems
-
K. P. Birman and T. A. Joseph. Exploiting Virtual Synchrony in Distributed Systems. ACM Operating Systems Review, 21(5):123-138, 1987
-
(1987)
ACM Operating Systems Review
, vol.21
, Issue.5
, pp. 123-138
-
-
Birman, K.P.1
Joseph, T.A.2
-
7
-
-
0034188591
-
Advances in network simulation
-
May
-
L. Breslau et al. Advances in Network Simulation. IEEE Computer, 33(5):59-67, May 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.5
, pp. 59-67
-
-
Breslau, L.1
-
16
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Kluwer Academic Publishers
-
D. Johnson and D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, vol.353
-
-
Johnson, D.1
Maltz, D.2
-
17
-
-
0031346670
-
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
-
D. R. Kuhh. Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems. In Second ACM Workshop on Role-Based Access Control (RBAC 97), pages 23-30, 1997.
-
(1997)
Second ACM Workshop on Role-based Access Control (RBAC 97)
, pp. 23-30
-
-
Kuhh, D.R.1
-
18
-
-
3042742896
-
PICO: A middleware framework for pervasive computing
-
M. Kumar and B. A. Shirazi. PICO: A Middleware Framework for Pervasive Computing. IEEE Pervasive Computing, 2(3):72-79, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.3
, pp. 72-79
-
-
Kumar, M.1
Shirazi, B.A.2
-
23
-
-
0000788149
-
Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
-
N. H. Minsky and V. Ungureanu. Law-Governed Interaction: A Coordination and Control Mechanism for Heterogeneous Distributed Systems. ACM Trans. on Software Engineering and Methodology, 9(3):273-305, 2000.
-
(2000)
ACM Trans. on Software Engineering and Methodology
, vol.9
, Issue.3
, pp. 273-305
-
-
Minsky, N.H.1
Ungureanu, V.2
-
25
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
Sept.
-
A. Perrig et al. SPINS: Security Protocols for Sensor Networks. Wireless Networks, 8(5), Sept. 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
-
-
Perrig, A.1
-
26
-
-
0030130161
-
Horus: A flexible group communication system
-
V. Renesse et al. Horus: A Flexible Group Communication System. Communications of ACM, 39(4):76-83, 1996.
-
(1996)
Communications of ACM
, vol.39
, Issue.4
, pp. 76-83
-
-
Renesse, V.1
-
27
-
-
0003614529
-
SDSI - A simple distributed security infrastructure
-
R. L. Rivest and B. Lampson. SDSI - A Simple Distributed Security Infrastructure. CRYPTO'96, 1996.
-
(1996)
CRYPTO'96
-
-
Rivest, R.L.1
Lampson, B.2
-
28
-
-
0030086382
-
Role-based access control models
-
R. Sandhu and E. Coyne. Role-Based Access Control Models. IEEE Computer, 29(8):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.8
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
-
30
-
-
21644476470
-
Secure virtual enclaves: Supporting coalition use of distributed application technologies
-
May
-
D. Shands et al. Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies. ACM Trans. on Information and System Security, 4(2), May 2001.
-
(2001)
ACM Trans. on Information and System Security
, vol.4
, Issue.2
-
-
Shands, D.1
-
35
-
-
0033357103
-
Securing ad-hoc networks
-
November/December
-
L. Zhou and Z. J. Haas. Securing Ad-Hoc Networks. IEEE Network Magazine, 13(6), November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
|