메뉴 건너뛰기




Volumn 1999-January, Issue , 1999, Pages 74-88

Secure communications processing for distributed languages

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS; COMPUTATIONAL LINGUISTICS; DISTRIBUTED COMPUTER SYSTEMS;

EID: 84940103422     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.1999.766719     Document Type: Conference Paper
Times cited : (8)

References (32)
  • 2
    • 20444431300 scopus 로고    scopus 로고
    • Se-cure web tunneling
    • Apr Proceedings of the 7th International World Wide Web Conference
    • M. Abadi, A. Birrell, R. Stata, and E. Wobber. Se-cure web tunneling. Computer Networks and ISDN Systems, 30(1-7):531-539, Apr. 1998. Proceedings of the 7th International World Wide Web Conference
    • (1998) Computer Networks and ISDN Systems , vol.30 , Issue.1-7 , pp. 531-539
    • Abadi, M.1    Birrell, A.2    Stata, R.3    Wobber, E.4
  • 5
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for crypto-graphic protocols: The spi calculus
    • Jan. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998
    • M. Abadi and A. D. Gordon. A calculus for crypto-graphic protocols: The spi calculus. Information and Computation, 148(1), Jan. 1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998
    • (1999) Information and Computation , vol.148 , Issue.1
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 0031332010 scopus 로고    scopus 로고
    • The altavista tun-nel: Using the internet to extend corporate networks
    • Oct. On the Web at
    • K. F. Alden and E. P. Wobber. The AltaVista tun-nel: Using the Internet to extend corporate networks. Digital Technical Journal, 9(2):5-15, Oct. 1997. On the Web at http://www.digital.com/info/DTJQ01/DTJQ01HM.HTM
    • (1997) Digital Technical Journal , vol.9 , Issue.2 , pp. 5-15
    • Alden, K.F.1    Wobber, E.P.2
  • 9
  • 11
    • 0022015288 scopus 로고
    • Secure communication using remote pro-cedure calls
    • Feb
    • A. D. Birrell. Secure communication using remote pro-cedure calls. ACM Transactions on Computer Sys-tems, 3(1):1-14, Feb. 1985
    • (1985) ACM Transactions on Computer Sys-tems , vol.3 , Issue.1 , pp. 1-14
    • Birrell, A.D.1
  • 13
    • 0004215976 scopus 로고
    • A logic of authentication
    • A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989
    • M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989
    • (1989) Proceedings of the Royal Society of London A , vol.426 , pp. 233-271
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 16
    • 0029703268 scopus 로고    scopus 로고
    • The reflexive chemical abstract machine and the join-calculus
    • ACM Jan
    • C. Fournet and G. Gonthier. The reflexive chemical abstract machine and the join-calculus. In Proceedings of POPL '96, pages 372-385. ACM, Jan. 1996
    • (1996) Proceedings of POPL , vol.96 , pp. 372-385
    • Fournet, C.1    Gonthier, G.2
  • 20
    • 0024304753 scopus 로고
    • A simple approach to specifying concur-rent systems
    • Jan
    • L. Lamport. A simple approach to specifying concur-rent systems. Commun. ACM, 32(1):32-45, Jan. 1989
    • (1989) Commun ACM , vol.32 , Issue.1 , pp. 32-45
    • Lamport, L.1
  • 24
    • 0002426876 scopus 로고    scopus 로고
    • A general theory of composition for a class of \possibilistic" properties
    • Jan
    • J. McLean. A general theory of composition for a class of \possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-66, Jan. 1996
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 53-66
    • McLean, J.1
  • 26
    • 44049114041 scopus 로고
    • A calculus of mo-bile processes, parts i and II
    • Sept
    • R. Milner, J. Parrow, and D. Walker. A calculus of mo-bile processes, parts I and II. Information and Com-putation, 100:1-40 and 41-77, Sept. 1992
    • (1992) Information and Com-putation , vol.100 , Issue.1-40 , pp. 41-77
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 27
    • 0018048246 scopus 로고
    • Using encryp-tion for authentication in large networks of computers
    • Dec
    • R. M. Needham and M. D. Schroeder. Using encryp-tion for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, Dec. 1978
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 28
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Secu-rity, 6(1-2), 1998
    • (1998) Journal of Computer Secu-rity , vol.6 , Issue.1-2
    • Paulson, L.C.1
  • 29
    • 84940119523 scopus 로고    scopus 로고
    • Sun Microsystems Inc RMI enhancements. Web pages at
    • Sun Microsystems, Inc. RMI enhancements. Web pages at http://java.sun.com/products/jdk/1.2/docs/guide/rmi/, 1997
    • (1997)
  • 32
    • 0001259536 scopus 로고    scopus 로고
    • A distributed object model for the Java system
    • Fall
    • A. Wollrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. Computing Systems, 9(4):265-290, Fall 1996
    • (1996) Computing Systems , vol.9 , Issue.4 , pp. 265-290
    • Wollrath, A.1    Riggs, R.2    Waldo, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.