-
1
-
-
0003683068
-
-
Addison-Wesley, June
-
Ken Arnold, Bryan O’Sullivan, Robert W. Scheifler, Jim Waldo, and Ann Wollrath. The Jini Specification. Addison-Wesley, June 1999.
-
(1999)
The Jini Specification
-
-
Arnold, Ken1
O’Sullivan, Bryan2
Scheifler, Robert W.3
Waldo, Jim4
Wollrath, Ann5
-
2
-
-
0033684451
-
A security infrastructure for distributed Java applications
-
Oakland, California, May
-
Dirk Balfanz, Drew Dean, and Mike Spreitzer. A security infrastructure for distributed Java applications. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 15–26, Oakland, California, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 15-26
-
-
Balfanz, Dirk1
Dean, Drew2
Spreitzer, Mike3
-
3
-
-
85053861123
-
A resource access decision service for CORBA-based distributed systems
-
Phoenix, Arizona, December
-
Konstantin Beznosov, Yi Deng, Bob Blakley, Carol Burt, and John Barkley. A resource access decision service for CORBA-based distributed systems. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC’99), pages 310–319, Phoenix, Arizona, December 1999.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC’99)
, pp. 310-319
-
-
Beznosov, Konstantin1
Deng, Yi2
Blakley, Bob3
Burt, Carol4
Barkley, John5
-
4
-
-
0004078695
-
-
RFC 2704, IETF, September
-
Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote trust-management system version 2. RFC 2704, IETF, September 1999.
-
(1999)
The KeyNote trust-management system version 2
-
-
Blaze, Matt1
Feigenbaum, Joan2
Ioannidis, John3
Keromytis, Angelos D.4
-
5
-
-
84982899264
-
The role of trust management in distributed systems security
-
Jan Bosch, Jan Vitek, and Christian D. Jensen, editors, pages Springer
-
Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Jan Bosch, Jan Vitek, and Christian D. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science volume 1603, pages 185–210. Springer, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science
, vol.1603
, pp. 185-210
-
-
Blaze, Matt1
Feigenbaum, Joan2
Ioannidis, John3
Keromytis, Angelos D.4
-
6
-
-
0029700344
-
Decentralized trust management
-
Oakland, California, May
-
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164–173, Oakland, California, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, Matt1
Feigenbaum, Joan2
Lacy, Jack3
-
8
-
-
0012073784
-
JRes: a resource accounting interface for Java
-
Vancouver, Canada, October
-
Grzegorz Czajkowski and Thorsten von Eicken. JRes: a resource accounting interface for Java. In Proceedings of the Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA’98), pages 21–35, Vancouver, Canada, October 1998.
-
(1998)
Proceedings of the Conference on Object-oriented Programming, Systems, Languages, and Applications (OOPSLA’98)
, pp. 21-35
-
-
Czajkowski, Grzegorz1
von Eicken, Thorsten2
-
9
-
-
85094635733
-
An architecture for a secure service discovery service
-
Seattle, Washington, August
-
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and Randy H. Katz. An architecture for a secure service discovery service. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCom’99), pages 24–35, Seattle, Washington, August 1999.
-
(1999)
Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCom’99)
, pp. 24-35
-
-
Czerwinski, Steven E.1
Zhao, Ben Y.2
Hodes, Todd D.3
Joseph, Anthony D.4
Katz, Randy H.5
-
11
-
-
0003593599
-
-
RFC 2693, IETF, September
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen. SPKI certificate theory. RFC 2693, IETF, September 1999.
-
(1999)
SPKI certificate theory
-
-
Ellison, Carl1
Frantz, Bill2
Lampson, Butler3
Rivest, Ron4
Thomas, Brian5
Ylönen, Tatu6
-
12
-
-
35248838692
-
Extending Jini with decentralized trust management
-
Tel Aviv, Israel, March
-
Pasi Eronen, Johannes Lehtinen, Jukka Zitting, and Pekka Nikander. Extending Jini with decentralized trust management. In Short paper proceedings of the 3rd IEEE Conference on Open Architectures and Network Programming (OPENARCH 2000), pages 25–29, Tel Aviv, Israel, March 2000.
-
(2000)
Short paper proceedings of the 3rd IEEE Conference on Open Architectures and Network Programming (OPENARCH 2000)
, pp. 25-29
-
-
Eronen, Pasi1
Lehtinen, Johannes2
Zitting, Jukka3
Nikander, Pekka4
-
16
-
-
0004077942
-
-
IETF, June
-
Erik Guttman, Charles Perkins, John Veizades, and Michael Day. Service location protocol, version 2. RFC 2608, IETF, June 1999.
-
(1999)
Service location protocol, version 2. RFC 2608
-
-
Guttman, Erik1
Perkins, Charles2
Veizades, John3
Day, Michael4
-
17
-
-
84893867563
-
Trade-offs in a secure Jini service architecture
-
Claudia Linnhoff-Popien and Heinz-Gerd Hegering, editors, pages Munich, Germany, September Springer
-
Peer Hasselmeyer, Roger Kehr, and Marco Voß. Trade-offs in a secure Jini service architecture. In Claudia Linnhoff-Popien and Heinz-Gerd Hegering, editors, Trends in Distributed Systems: Towards a Universal Service Market. Third International IFIP/GI working conference proceedings (USM 2000), Lecture Notes in Computer Science volume 1890, pages 190–201, Munich, Germany, September 2000. Springer.
-
(2000)
Trends in Distributed Systems: Towards a Universal Service Market. Third International IFIP/GI working conference proceedings (USM 2000), Lecture Notes in Computer Science volume 1890
, pp. 190-201
-
-
Hasselmeyer, Peer1
Kehr, Roger2
Voß, Marco3
-
19
-
-
85013593271
-
Flexible control of downloaded executable content
-
May
-
Trent Jaeger, Atul Prakash, Jochen Liedtke, and Nayeem Islam. Flexible control of downloaded executable content. ACM Transactions on Information and System Security, 2(2):177–228, May 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 177-228
-
-
Jaeger, Trent1
Prakash, Atul2
Liedtke, Jochen3
Islam, Nayeem4
-
20
-
-
85180792145
-
A revocation, validation and authentication protocol for SPKI based delegation systems
-
San Diego, California, February
-
Yki Kortesniemi, Tero Hasu, and Jonna Särs. A revocation, validation and authentication protocol for SPKI based delegation systems. In Proceedings of the 2000 Network and Distributed System Security Symposium (NDSS 2000), pages 85–101, San Diego, California, February 2000.
-
(2000)
Proceedings of the 2000 Network and Distributed System Security Symposium (NDSS 2000)
, pp. 85-101
-
-
Kortesniemi, Yki1
Hasu, Tero2
Särs, Jonna3
-
21
-
-
84969377247
-
User authentication and authorization in the Java platform
-
Phoenix, Arizona, December
-
Charlie Lai, Li Gong, Larry Koved, Anthony Nadalin, and Roland Schemers. User authentication and authorization in the Java platform. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC’99), pages 285–290, Phoenix, Arizona, December 1999.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC’99)
, pp. 285-290
-
-
Lai, Charlie1
Gong, Li2
Koved, Larry3
Nadalin, Anthony4
Schemers, Roland5
-
22
-
-
12444310225
-
Using SPKI certificates for authorization in CORBA based distributed object-oriented systems
-
Kista, Sweden, November
-
Tuomo Lampinen. Using SPKI certificates for authorization in CORBA based distributed object-oriented systems. In Proceedings of the 4th Nordic Workshop on Secure IT systems (NordSec’99), pages 61–81, Kista, Sweden, November 1999.
-
(1999)
Proceedings of the 4th Nordic Workshop on Secure IT systems (NordSec’99)
, pp. 61-81
-
-
Lampinen, Tuomo1
-
28
-
-
1542802513
-
-
Salutation Consortium. Salutation home page. http://www.salutation.org/, 2000.
-
(2000)
Salutation home page
-
-
-
29
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Cambridge, UK, April Springer
-
Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science volume 1796, Cambridge, UK, April 1999. Springer.
-
(1999)
Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science volume 1796
-
-
Stajano, Frank1
Anderson, Ross2
-
30
-
-
85180799465
-
Securing Jini connection technology
-
San Francisco, California. Slides June
-
Christopher Steel. Securing Jini connection technology. Technical presentation 573 at the JavaOne 2000 conference, San Francisco, California. Slides available from http://java.sun.com/javaone/javaone00/, June 2000.
-
(2000)
Technical presentation 573 at the JavaOne 2000 conference
-
-
Steel, Christopher1
-
31
-
-
85084163300
-
Scalable access control for distributed object systems
-
Washington, D.C., August
-
Daniel F. Sterne, Gregg W. Tally, C. Durward McDonell, David L. Sherman, David L. Sames, Pierre X. Pasturel, and E. John Sebes. Scalable access control for distributed object systems. In Proceedings of the 8th USENIX Security Symposium, pages 201–214, Washington, D.C., August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 201-214
-
-
Sterne, Daniel F.1
Tally, Gregg W.2
Durward McDonell, C.3
Sherman, David L.4
Sames, David L.5
Pasturel, Pierre X.6
John Sebes, E.7
-
32
-
-
0003970746
-
-
Sun Microsystems. Technical specification, early look draft 3, April
-
Sun Microsystems. Java remote method invocation security extension. Technical specification, early look draft 3, http://java.sun.com/products/jdk/rmi/rmisec-doc/, April 2000.
-
(2000)
Java remote method invocation security extension
-
-
-
35
-
-
0004147275
-
-
Technical Report SMLI TR-94-29, Sun Microsystems Laboratories, November
-
Jim Waldo, Geoff Wyant, Ann Wollrath, and Sam Kendall. A note on distributed computing. Technical Report SMLI TR-94-29, Sun Microsystems Laboratories, November 1994.
-
(1994)
A note on distributed computing
-
-
Waldo, Jim1
Wyant, Geoff2
Wollrath, Ann3
Kendall, Sam4
-
36
-
-
0031542975
-
Extensible security architectures for Java
-
Saint-Malo, France, October
-
Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Felten. Extensible security architectures for Java. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP’97), pages 116–128, Saint-Malo, France, October 1997.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP’97)
, pp. 116-128
-
-
Wallach, Dan S.1
Balfanz, Dirk2
Dean, Drew3
Felten, Edward W.4
|