-
2
-
-
0030130161
-
Horus: A flexible group communication system
-
April
-
R. V. Renesse, K. Birman, and S. Maffeis, "Horus: A flexible group communication system, " Communications of the ACM, vol. 39, pp. 76-83, April 1996.
-
(1996)
Communications of the ACM
, vol.39
, pp. 76-83
-
-
Renesse, R. V.1
Birman, K.2
Maffeis, S.3
-
3
-
-
85029688731
-
Transis: A communication sub-system for high availability
-
Y. Amir, D. Dolev, S. Kramer, and D. Malki, "Transis: A communication sub-system for high availability, " Digest of Papers, The 22nd International Symposium on Fault-Tolerant Computing Systems, pp. 76-84, 1992.
-
(1992)
Digest of Papers, The 22nd International Symposium on Fault-Tolerant Computing Systems
, pp. 76-84
-
-
Amir, Y.1
Dolev, D.2
Kramer, S.3
Malki, D.4
-
4
-
-
0029408206
-
The Totem single-ring ordering and membership protocol
-
November
-
Y. Amir, L. E. Moser, P. M. Melliar-Smith, D. Agar-wal, and P. Ciarfella, "The Totem single-ring ordering and membership protocol, " ACM Transactions on Computer Systems, vol. 13, pp. 311-342, November 1995.
-
(1995)
ACM Transactions on Computer Systems
, vol.13
, pp. 311-342
-
-
Amir, Y.1
Moser, L. E.2
Melliar-Smith, P. M.3
Agar-wal, D.4
Ciarfella, P.5
-
5
-
-
0002669283
-
A high performance totally ordered multicast protocol
-
September
-
B. Whetten, T. Montgomery, and S. Kaplan, "A high performance totally ordered multicast protocol, " in Theory and Practice in Distributed Systems, International Workshop, LNCS, p. 938, September 1994.
-
(1994)
Theory and Practice in Distributed Systems, International Workshop, LNCS
, pp. 938
-
-
Whetten, B.1
Montgomery, T.2
Kaplan, S.3
-
7
-
-
0031605747
-
The SecureRing protocols for securing group communication
-
January
-
K. P. Kihlstrom, L. E. Moser, and P. M. Melliar-Smith, "The SecureRing protocols for securing group communication, " in Proceedings. of the IEEE 31st Hawaii International Conference on System Sciences, pp. 317-326, January 1998.
-
(1998)
Proceedings. of the IEEE 31st Hawaii International Conference on System Sciences
, pp. 317-326
-
-
Kihlstrom, K. P.1
Moser, L. E.2
Melliar-Smith, P. M.3
-
8
-
-
0345427593
-
-
Tech. Rep. 2000-1823, Cornell University, Computer Science; Tech. Rep. 2000-45, Hebrew University, Computer Science
-
O. Rodeh, K. Birman, and D. Dolev, "Using AVL trees for fault tolerant group key management, " Tech. Rep. 2000-1823, Cornell University, Computer Science; Tech. Rep. 2000-45, Hebrew University, Computer Science, 2000.
-
(2000)
Using AVL trees for fault tolerant group key management
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
9
-
-
0003774039
-
-
Tech. Rep. 98-4, Johns Hopkins University, Center of Networking and Distributed Systems
-
Y. Amir and J. Stanton, "The Spread wide area group communication system, " Tech. Rep. 98-4, Johns Hopkins University, Center of Networking and Distributed Systems, 1998.
-
(1998)
The Spread wide area group communication system
-
-
Amir, Y.1
Stanton, J.2
-
10
-
-
4444241348
-
-
tech. rep., CNDS-2004-1, Johns Hopkins University
-
Y. Amir, C. Danilov, M. Miskin-Amir, J. Schultz, and J. Stanton, "The Spread toolkit: Architecture and performance, " tech. rep., 2004. CNDS-2004-1, Johns Hopkins University.
-
(2004)
The Spread toolkit: Architecture and performance
-
-
Amir, Y.1
Danilov, C.2
Miskin-Amir, M.3
Schultz, J.4
Stanton, J.5
-
12
-
-
0032178082
-
Secure group communications using key graphs
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs, " in Proceedings of the ACM SIGCOMM '98, pp. 68-79, 1998.
-
(1998)
Proceedings of the ACM SIGCOMM '98
, pp. 68-79
-
-
Wong, C. K.1
Gouda, M. G.2
Lam, S. S.3
-
14
-
-
85116450234
-
Secure group communication using robust contributory key agreement
-
September
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, and G. Tsudik, "Secure group communication using robust contributory key agreement, " in To appear in Transactions on Parallel and Distributed Systems, September 2003.
-
(2003)
To appear in Transactions on Parallel and Distributed Systems
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.4
Stanton, J.5
Tsudik, G.6
-
15
-
-
85084161955
-
Antigone: A flexible framework for secure group communication
-
August
-
P. McDaniel, A. Prakash, and P. Honeyman, "Antigone: A flexible framework for secure group communication, " in Proceedings of the 8th USENIX Security Symposium, pp. 99-114, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 99-114
-
-
McDaniel, P.1
Prakash, A.2
Honeyman, P.3
-
16
-
-
0034860363
-
An integrated solution for secure group communication in wide-area networks
-
(Hammamet, Tunisia), July
-
D. A. Agarwal, O. Chevassut, M. R. Thompson, and G. Tsudik, "An integrated solution for secure group communication in wide-area networks, " in Proceedings of the 6th IEEE Symposium on Computers and Communications, (Hammamet, Tunisia), July 2001.
-
(2001)
Proceedings of the 6th IEEE Symposium on Computers and Communications
-
-
Agarwal, D. A.1
Chevassut, O.2
Thompson, M. R.3
Tsudik, G.4
-
17
-
-
85010853294
-
The architecture and performance of security protocols in the Ensemble Group Communication System
-
August
-
O. Rodeh, K. Birman, and D. Dolev, "The architecture and performance of security protocols in the Ensemble Group Communication System, " ACM Transactions on Information and System Security, vol. 4, pp. 289-319, August 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 289-319
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
18
-
-
84942234491
-
Scaling secure group communication systems: Beyond peer-to-peer
-
(Washington, D. C), April
-
Y. Amir, C. Nita-Rotaru, J. Stanton, and G. Tsudik, "Scaling secure group communication systems: Beyond peer-to-peer, " in the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), (Washington, D. C.), April 2003.
-
(2003)
the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III)
-
-
Amir, Y.1
Nita-Rotaru, C.2
Stanton, J.3
Tsudik, G.4
-
19
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models, " IEEE Computer, vol. 29, pp. 38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R. S.1
Coyne, E. J.2
Feinstein, H. L.3
Youman, C. E.4
-
21
-
-
84948440714
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, May
-
N. Li, J. C. Mitchell, and W. H. Winsborough, "Design of a role-based trust management framework, " in Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114-130, IEEE Computer Society Press, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J. C.2
Winsborough, W. H.3
-
23
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept
-
B. C. Neuman and T. Ts'o, "Kerberos: An authentication service for computer networks, " IEEE Communications Magazine, pp. 33-38, Sept. 1994.
-
(1994)
IEEE Communications Magazine
, pp. 33-38
-
-
Neuman, B. C.1
Ts'o, T.2
-
25
-
-
0011917214
-
-
I.-T. R. X. (revised), International Telecommunication Union
-
I.-T. R. X. (revised), The Directory - Authentication Framework. International Telecommunication Union, 1993.
-
(1993)
The Directory - Authentication Framework
-
-
-
27
-
-
0036086451
-
Methods and limitations of security policy reconciliation
-
(Oakland, CA), May
-
P. McDaniel and A. Prakash, "Methods and limitations of security policy reconciliation, " in IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 73-87, May 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 73-87
-
-
McDaniel, P.1
Prakash, A.2
-
28
-
-
2942654406
-
Certificate-based authorization policy in a PKI environment
-
M. R. Thompson, A. Essiari, and S. Mudumbai, "Certificate-based authorization policy in a PKI environment, " ACM Trans. Inf. Syst. Secur., vol. 6, no. 4, pp. 566-588, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M. R.1
Essiari, A.2
Mudumbai, S.3
-
29
-
-
85086639439
-
Principles of policy in secure groups
-
(San Diego, CA), February
-
H. Harney, A. Colegrove, and P. McDaniel, "Principles of policy in secure groups, " in Network and Distributed Systems Security, (San Diego, CA), February 2001.
-
(2001)
Network and Distributed Systems Security
-
-
Harney, H.1
Colegrove, A.2
McDaniel, P.3
|