-
2
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb
-
David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34–64, Feb 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Richard Kuhn, D.3
-
3
-
-
85013607444
-
A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
-
Cambridge, MA, Aug
-
S. Floyd, V. Jacobson, and S. McCanne. A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing. In Proc. of the 1995 ACM SIGCOMM Conference, pages 342-356, Cambridge, MA, Aug 1995.
-
(1995)
Proc. Of the 1995 ACM SIGCOMM Conference
, pp. 342-356
-
-
Floyd, S.1
Jacobson, V.2
McCanne, S.3
-
5
-
-
0031650454
-
Oasis: Access control in an open, distributed environment
-
Oakland, CA, May, IEEE
-
Richard Hayton, Jean Bacon, and Ken Moody. Oasis: Access control in an open, distributed environment. In Proc. of IEEE Symposium on Security and Privacy, pages 3–14, Oakland, CA, May 1998. IEEE.
-
(1998)
In Proc. Of IEEE Symposium on Security and Privacy
, pp. 3-14
-
-
Hayton, R.1
Bacon, J.2
Moody, K.3
-
7
-
-
0002179618
-
Protection. In Proc. Fifth Princeton Symposium on Information Sciences and Systems
-
B. W. Lampson. Protection. In Proc. Fifth Princeton Symposium on Information Sciences and Systems, pages 437–443, March 1971. reprinted in Operating Systems Review, 8, 1 (Jan. 1974) pp. 417-429.
-
(1974)
March 1971. Reprinted in Operating Systems Review
, vol.8 Jan
, Issue.1
, pp. 437-443
-
-
Lampson, B.W.1
-
9
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993–999, Dec 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
11
-
-
0041498613
-
Naming and binding of objects
-
In R. Bayer, R.M. Graham, and G. Seegmuller, editors, Springer-Verlag, Berlin
-
J. H. Saltzer. Naming and binding of objects. In R. Bayer, R.M. Graham, and G. Seegmuller, editors, Operating Systems, An Advanced Course, pages 99–208. Springer-Verlag, Berlin, 1979.
-
(1979)
Operating Systems, an Advanced Course
, pp. 99-208
-
-
Saltzer, J.H.1
-
12
-
-
0030086382
-
Youman. Role-based access control models
-
Feb
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Feb 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Charles, E.4
-
13
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
Dec
-
F. B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4):299–319, Dec 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
14
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX, Uniforum
-
J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In USENIX, Dallas, TX, 1988. Uniforum.
-
(1988)
In USENIX
-
-
Steiner, J.G.1
Neuman, C.2
Schiller, J.I.3
-
15
-
-
0026973508
-
Message authentication with one-way hash functions
-
IEEE Press, May
-
Gene Tsudik. Message authentication with one-way hash functions. In IEEE Infocom 1992. IEEE Press, May 1992.
-
(1992)
In IEEE Infocom 1992
-
-
Tsudik, G.1
|