-
4
-
-
0030083693
-
Middleware: A Model for Distributed System Services
-
February
-
P.A. Bernstein. Middleware: a Model for Distributed System Services. Communication of the ACM, 39(2), February 1996.
-
(1996)
Communication of the ACM
, vol.39
, Issue.2
-
-
Bernstein, P.A.1
-
8
-
-
0029222449
-
Integrating Security in CORBA Based Object Architectures
-
R.H. Deng, S.K. Bhonsle, W. Wang, and A.A. Lazar. Integrating Security in CORBA Based Object Architectures. In Proceedings of the IEEE Symposium on Security and Privacy, pages 50-61, May 1995.
-
(1995)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 50-61
-
-
Deng, R.H.1
Bhonsle, S.K.2
Wang, W.3
Lazar, A.A.4
-
9
-
-
0003969633
-
-
Technical Report DoD 5200.28-STD, December
-
Department of Defense Standard. Trusted computer system evaluation criteria. Technical Report DoD 5200.28-STD, December 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
10
-
-
0016963069
-
Programming-in-the-Large versus Programming-in-the-Small
-
F. DeRemer and H. Kron. Programming-in-the-Large versus Programming-in-the-Small. IEEE Transactions on Software Engineering, 2(2):80-86, June 1976.
-
(1976)
IEEE Transactions on Software Engineering
, vol.2
, Issue.2
, pp. 80-86
-
-
Deremer, F.1
Kron, H.2
-
12
-
-
84976215953
-
Coordination languages and their significance
-
D. Gelernter and N. Carriero. Coordination languages and their significance. Communications of the ACM, 35(2):97-107, 1992.
-
(1992)
Communications of the ACM
, vol.35
, Issue.2
, pp. 97-107
-
-
Gelernter, D.1
Carriero, N.2
-
17
-
-
0026242187
-
Security in open networks and distributed systems
-
P. Janson and R. Molva. Security in open networks and distributed systems. Computer Networks and ISDN Systems, (22):323-346, 1991.
-
(1991)
Computer Networks and ISDN Systems
, vol.22
, pp. 323-346
-
-
Janson, P.1
Molva, R.2
-
18
-
-
0026684778
-
Authentication in Distributed Systems: Theory and Practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
19
-
-
0019608720
-
Formal models for computer security
-
C. E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247-278, November 1981.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
22
-
-
84957073062
-
-
Technical Report NCSC-TG-005, July
-
National Computer Security Center. Trusted network interpretation of the tcsec. Technical Report NCSC-TG-005, July 1987.
-
(1987)
Trusted Network Interpretation of the Tcsec
-
-
-
24
-
-
0006736457
-
-
TC Document 94.4.16, OMG, April, Available by ftp at ftp.omg.org:/pub/docs
-
OMG Security Working Group. White Paper on Security. TC Document 94.4.16, OMG, April 1994. Available by ftp at ftp.omg.org:/pub/docs.
-
(1994)
White Paper on Security
-
-
-
28
-
-
0029288830
-
Abstractions for software architecture and tools to support them
-
M. Shaw, R. DeLine, D. Klein, T. Ross, D. Young, and G. Zelesnik. Abstractions for software architecture and tools to support them. IEEE Transactions on Software Engineering, 21(4):314-335, 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.4
, pp. 314-335
-
-
Shaw, M.1
Deline, R.2
Klein, D.3
Ross, T.4
Young, D.5
Zelesnik, G.6
-
30
-
-
0029697576
-
Secure Network Objects
-
L. van Doom, M. Abadi, M. Burrows, and E. Wobber. Secure Network Objects. In Proceedings of the IEEE Symposium on Security and Privacy, pages 211-221, May 1996.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 211-221
-
-
Van Doom, L.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
31
-
-
0027809739
-
Authentication in the Taos Operating System
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos Operating System. In Proceedings of ACM SIGOPS '93, pages 256-269, 1993.
-
(1993)
Proceedings of ACM SIGOPS '93
, pp. 256-269
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|