메뉴 건너뛰기




Volumn , Issue , 1996, Pages 26-39

A security framework supporting domain-based access control in distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DISTRIBUTED COMPUTER SYSTEMS;

EID: 84947280560     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NDSS.1996.492352     Document Type: Conference Paper
Times cited : (16)

References (15)
  • 1
    • 0028726831 scopus 로고
    • Policy driven management for distributed systems
    • M. Sloman, "Policy Driven Management for Distributed Systems", Journal of Network and Systems Management, Vol. 2(4), pp. 333-361, 1994.
    • (1994) Journal of Network and Systems Management , vol.2 , Issue.4 , pp. 333-361
    • Sloman, M.1
  • 2
    • 0028466968 scopus 로고
    • Sesame: The solution to security for open distributed systems
    • P Kaijser, T. Parker and D. Pinkas, "SESAME: The solution to security for open distributed systems", Computer Communications, Vol. 17(7), pp. 501-518, 1994.
    • (1994) Computer Communications , vol.17 , Issue.7 , pp. 501-518
    • Kaijser, P.1    Parker, T.2    Pinkas, D.3
  • 3
    • 85068027691 scopus 로고
    • IONA Technical Report PN: PR-TEC-7-5, IONA Technologies Ltd. Dublin, Ireland
    • IONA, "Orbix™-A Technical Overview", Technical Report PN: PR-TEC-7-5, IONA Technologies Ltd. Dublin, Ireland, 1993.
    • (1993) Orbix™-A Technical Overview
  • 7
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice"
    • B. Lampson, M. Abadi, M. Burrows and E. Wobber, "Authentication in Distributed Systems: Theory and Practice", ACM TOCS Vol. 10(4), pp. 265-310, 1992.
    • (1992) ACM TOCS , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 8
    • 0038663254 scopus 로고
    • Imperial College Research Report DoC 95/10 ftp://dse.doc.ic.ac.Uk/dse-papers/management/maps.ps.Z
    • D. Marriott and M. Sloman, "Management Policy Service for Distributed Systems", Imperial College Research Report DoC 95/10, 1995, ftp://dse.doc.ic.ac.Uk/dse-papers/management/maps.ps.Z.
    • (1995) Management Policy Service for Distributed Systems
    • Marriott, D.1    Sloman, M.2
  • 9
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • J. Voydock and S. Kent, "Security Mechanisms in high-level network protocols", ACM Computing Surveys, Vol. 15(2), pp. ppl35-171, 1983.
    • (1983) ACM Computing Surveys , vol.15 , Issue.2 , pp. l35-171
    • Voydock, J.1    Kent, S.2
  • 10
    • 0003602325 scopus 로고
    • The md5 message-digest algorithm
    • MIT Laboratory for Computer Science and RSA Data Security, Inc.
    • R. Rivest, "The MD5 Message-Digest Algorithm", RFC RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992.
    • (1992) RFC RFC , vol.1321
    • Rivest, R.1
  • 12
    • 0025508369 scopus 로고
    • Network security via private-key certificates
    • D. Davis and R. Swick, "Network Security via Private-Key Certificates", ACM SIGOPS Operating Systems Review, Vol. 24(4), pp. 64-67, 1990.
    • (1990) ACM SIGOPS Operating Systems Review , vol.24 , Issue.4 , pp. 64-67
    • Davis, D.1    Swick, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.