-
1
-
-
0032645280
-
GASS: A data movement and access service for wide area computing systems
-
Atlanta, GA, May
-
Joseph Bester, Ian Foster, Carl Kesselman, Jean Tedesco, and Steven Tuecke. GASS: A data movement and access service for wide area computing systems. In Proceedings of the Sixth Workshop on Input/Output in Parallel and Distributed Systems, pages 78–88, Atlanta, GA, May 1999.
-
(1999)
Proceedings of the Sixth Workshop on Input/Output in Parallel and Distributed Systems
, pp. 78-88
-
-
Bester, Joseph1
Foster, Ian2
Kesselman, Carl3
Tedesco, Jean4
Tuecke, Steven5
-
2
-
-
0003563576
-
-
Technical Report 111, Digital Systems Research Center, Palo Alto, CA, September
-
Andrew D. Birrell, Andy Hisgen, Chuck Jerian, Timothy Mann, and Garret Swart. The Echo distributed file system. Technical Report 111, Digital Systems Research Center, Palo Alto, CA, September 1993.
-
(1993)
The Echo distributed file system
-
-
Birrell, Andrew D.1
Hisgen, Andy2
Jerian, Chuck3
Mann, Timothy4
Swart, Garret5
-
3
-
-
0034502932
-
A national-scale authentication infrastructure
-
R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, and V. Welch. A national-scale authentication infrastructure. IEEE Computer, 33(12):60–66, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 60-66
-
-
Butler, R.1
Engert, D.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
Volmer, J.6
Welch, V.7
-
4
-
-
85084163882
-
Security in Plan 9
-
San Francisco, CA, August
-
Russ Cox, Eric Grosse, Rob Pike, Dave Presotto, and Sean Quinlan. Security in Plan 9. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Cox, Russ1
Grosse, Eric2
Pike, Rob3
Presotto, Dave4
Quinlan, Sean5
-
5
-
-
84948463070
-
A resource management architecture for metacomputing systems
-
K. Czajkowski, I. Foster, N. Karonis, C. Kesselman, S. Martin, W. Smith, and S. Tuecke. A resource management architecture for metacomputing systems. In Proceedings of the IPPS/SPDP ’98 Workshop on Job Scheduling Strategies for Parallel Processing, pages 62–82, 1998.
-
(1998)
Proceedings of the IPPS/SPDP ’98 Workshop on Job Scheduling Strategies for Parallel Processing
, pp. 62-82
-
-
Czajkowski, K.1
Foster, I.2
Karonis, N.3
Kesselman, C.4
Martin, S.5
Smith, W.6
Tuecke, S.7
-
7
-
-
0003629991
-
-
FIPS 180-1. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
9
-
-
0032218229
-
A security architecture for computational grids
-
San Francisco, CA, November
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational grids. In Proceedings of the 5th ACM Conference on Computer and Communications Security Conference, pages 83–92, San Francisco, CA, November 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security Conference
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
11
-
-
85091094210
-
-
glogin
-
glogin. http://www.gup.uni-linz.ac.at/glogin/.
-
-
-
-
13
-
-
0023964787
-
Scale and performance in a distributed file system
-
February
-
John H. Howard, Michael L. Kazar, Sherri G. Menees, David A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, and Michael J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6(1):51–81, February 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard, John H.1
Kazar, Michael L.2
Menees, Sherri G.3
Nichols, David A.4
Satyanarayanan, M.5
Sidebotham, Robert N.6
West, Michael J.7
-
16
-
-
85084162710
-
Implementing a secure rlogin environment: A case study of using a secure network layer protocol
-
Salt Lake City, UT, June
-
Gene Kim, Hilarie Orman, and Sean O’Malley. Implementing a secure rlogin environment: A case study of using a secure network layer protocol. In Proceedings of the 5th USENIX Security Symposium, pages 65–74, Salt Lake City, UT, June 1995.
-
(1995)
Proceedings of the 5th USENIX Security Symposium
, pp. 65-74
-
-
Kim, Gene1
Orman, Hilarie2
O’Malley, Sean3
-
18
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Butler Lampson, Martín Abadi, Michael Burrows, and Edward P. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265–310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, Butler1
Abadi, Martín2
Burrows, Michael3
Wobber, Edward P.4
-
19
-
-
85084162072
-
A toolkit for user-level file systems
-
USENIX, June
-
David Mazières. A toolkit for user-level file systems. In Proceedings of the 2001 USENIX, pages 261–274. USENIX, June 2001.
-
(2001)
Proceedings of the 2001 USENIX
, pp. 261-274
-
-
Mazières, David1
-
20
-
-
0042352260
-
Separating key management from file system security
-
Kiawa Island, SC
-
David Mazières, Michael Kaminsky, M. Frans Kaashoek, and Emmett Witchel. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles, pages 124–139, Kiawa Island, SC, 1999.
-
(1999)
Proceedings of the 17th ACM Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, David1
Kaminsky, Michael2
Frans Kaashoek, M.3
Witchel, Emmett4
-
21
-
-
85091124184
-
-
OpenSSH. http://www.openssh.com/.
-
-
-
OpenSSH1
-
22
-
-
0005025933
-
The use of name spaces in plan 9
-
Apr
-
Rob Pike, Dave Presotto, Ken Thompson, Howard Trickey, and Phil Winterbottom. The use of name spaces in plan 9. ACM SIGOPS Operating System Review, 27(2):72–76, Apr 1993.
-
(1993)
ACM SIGOPS Operating System Review
, vol.27
, Issue.2
, pp. 72-76
-
-
Pike, Rob1
Presotto, Dave2
Thompson, Ken3
Trickey, Howard4
Winterbottom, Phil5
-
24
-
-
85048404745
-
Preventing Privilege Escalation
-
Washington, DC, August
-
Niels Provos, Markus Friedl, and Peter Honeyman. Preventing Privilege Escalation. In Proceedings of the 12th USENIX Security Symposium, Washington, DC, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Provos, Niels1
Friedl, Markus2
Honeyman, Peter3
-
25
-
-
0003509661
-
-
Network Working Group, February
-
Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear. Address allocation for private internets. RFC 1918, Network Working Group, February 1996.
-
(1996)
Address allocation for private internets. RFC 1918
-
-
Rekhter, Y.1
Moskowitz, B.2
Karrenberg, D.3
de Groot, G. J.4
Lear, E.5
-
26
-
-
0016081584
-
Protection and control of information in multics
-
July
-
Jerome Saltzer. Protection and control of information in multics. Communications of the ACM, 17(7):388–402, July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
, pp. 388-402
-
-
Saltzer, Jerome1
-
30
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX, February USENIX
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX, pages 191–202, Dallas, TX, February 1988. USENIX.
-
(1988)
Proceedings of the Winter 1988 USENIX
, pp. 191-202
-
-
Steiner, J. G.1
Neuman, B. C.2
Schiller, J. I.3
-
31
-
-
85084161633
-
Stel: Secure telnet
-
Salt Lake City, UT, June
-
David Vincenzetti, Stefano Taino, and Fabio Bolognesi. Stel: Secure telnet. In Proceedings of the 5th USENIX Security Symposium, pages 75–84, Salt Lake City, UT, June 1995.
-
(1995)
Proceedings of the 5th USENIX Security Symposium
, pp. 75-84
-
-
Vincenzetti, David1
Taino, Stefano2
Bolognesi, Fabio3
-
32
-
-
17644368658
-
X.509 proxy certificates for dynamic delegation
-
April
-
V. Welch, I. Foster, C. Kesselman, O. Mulmo, S. Tuecke L. Pearl-man, J. Gawor, S. Meder, and F. Siebenlist. X.509 proxy certificates for dynamic delegation. In Proceedings of the 3rd Annual PKI R&D Workshop, April 2004.
-
(2004)
Proceedings of the 3rd Annual PKI R&D Workshop
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Tuecke, S.5
Pearl-man, L.6
Gawor, J.7
Meder, S.8
Siebenlist, F.9
-
33
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
November
-
Hugh C. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, IT-26(6):726–729, November 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.6
, pp. 726-729
-
-
Williams, Hugh C.1
-
34
-
-
0028380781
-
Authentication in the Taos operating system
-
Edward P. Wobber, Martín Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3–32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, Edward P.1
Abadi, Martín2
Burrows, Michael3
Lampson, Butler4
-
38
-
-
85084164692
-
SSH – secure login connections over the Internet
-
San Jose, CA, July
-
Tatu Ylönen. SSH – secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37–42, San Jose, CA, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 37-42
-
-
Ylönen, Tatu1
|