-
1
-
-
0028726831
-
Policy driven management for distributed systems
-
M. Sloman, "Policy Driven Management for Distributed Systems", Journal of Network and Systems Management, Vol. 2(4), pp. 333-361, 1994.
-
(1994)
Journal of Network and Systems Management
, vol.2
, Issue.4
, pp. 333-361
-
-
Sloman, M.1
-
2
-
-
0028466968
-
Sesame: The solution to security for open distributed systems
-
P Kaijser, T. Parker and D. Pinkas, "SESAME: The solution to security for open distributed systems", Computer Communications, Vol. 17(7), pp. 501-518, 1994.
-
(1994)
Computer Communications
, vol.17
, Issue.7
, pp. 501-518
-
-
Kaijser, P.1
Parker, T.2
Pinkas, D.3
-
3
-
-
85068027691
-
-
IONA Technical Report PN: PR-TEC-7-5, IONA Technologies Ltd. Dublin, Ireland
-
IONA, "Orbix™-A Technical Overview", Technical Report PN: PR-TEC-7-5, IONA Technologies Ltd. Dublin, Ireland, 1993.
-
(1993)
Orbix™-A Technical Overview
-
-
-
6
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson and G. Plotkin, "A Calculus for Access Control in Distributed Systems", ACM Transactions on Programming Languages and Systems, Vol. 15(4), pp. 706-734, 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
7
-
-
84976834054
-
Authentication in distributed systems: Theory and practice"
-
B. Lampson, M. Abadi, M. Burrows and E. Wobber, "Authentication in Distributed Systems: Theory and Practice", ACM TOCS Vol. 10(4), pp. 265-310, 1992.
-
(1992)
ACM TOCS
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
8
-
-
0038663254
-
-
Imperial College Research Report DoC 95/10 ftp://dse.doc.ic.ac.Uk/dse-papers/management/maps.ps.Z
-
D. Marriott and M. Sloman, "Management Policy Service for Distributed Systems", Imperial College Research Report DoC 95/10, 1995, ftp://dse.doc.ic.ac.Uk/dse-papers/management/maps.ps.Z.
-
(1995)
Management Policy Service for Distributed Systems
-
-
Marriott, D.1
Sloman, M.2
-
9
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
J. Voydock and S. Kent, "Security Mechanisms in high-level network protocols", ACM Computing Surveys, Vol. 15(2), pp. ppl35-171, 1983.
-
(1983)
ACM Computing Surveys
, vol.15
, Issue.2
, pp. l35-171
-
-
Voydock, J.1
Kent, S.2
-
10
-
-
0003602325
-
The md5 message-digest algorithm
-
MIT Laboratory for Computer Science and RSA Data Security, Inc.
-
R. Rivest, "The MD5 Message-Digest Algorithm", RFC RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992.
-
(1992)
RFC RFC
, vol.1321
-
-
Rivest, R.1
-
11
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication", ACM Transactions on Computer Systems, Vol. 8(1), pp. 18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
12
-
-
0025508369
-
Network security via private-key certificates
-
D. Davis and R. Swick, "Network Security via Private-Key Certificates", ACM SIGOPS Operating Systems Review, Vol. 24(4), pp. 64-67, 1990.
-
(1990)
ACM SIGOPS Operating Systems Review
, vol.24
, Issue.4
, pp. 64-67
-
-
Davis, D.1
Swick, R.2
|