메뉴 건너뛰기




Volumn Part F129440, Issue , 1996, Pages 34-43

A new model of security for distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84956852410     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/304851.304860     Document Type: Conference Paper
Times cited : (11)

References (22)
  • 2
    • 84942210172 scopus 로고
    • Easy to use object-oriented parallel programming with Mentat
    • May
    • Andrew. S. Grimshaw, "Easy to use object-oriented parallel programming with Mentat", IEEE computer, pp 39-51, May 1993
    • (1993) IEEE Computer , pp. 39-51
    • Grimshaw, A.S.1
  • 4
    • 0027610863 scopus 로고
    • No pain and gain - Experiences with mentat on biological application
    • June
    • Andrew S. Grimshaw, E. A. West, and W. R. Pearson, "No Pain and Gain! - Experiences with Mentat on Biological Application, " Concurrency: Practice & Experience, pp. 309-328, vol. 5, issue 4, June 1993
    • (1993) Concurrency: Practice & Experience , vol.5 , Issue.4 , pp. 309-328
    • Grimshaw, A.S.1    West, E.A.2    Pearson, W.R.3
  • 9
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks"
    • Sept
    • B. C. Neuman, T. Y. Tsio, "Kerberos: An Authentication Service for Computer Networks" IEEE Communications, Vol. 32, pp. 33-38, Sept. 1994
    • (1994) IEEE Communications , vol.32 , pp. 33-38
    • Neuman, B.C.1    Tsio, T.Y.2
  • 12
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Dorothy R. Denning, "A Lattice Model of Secure Information Flow", Communications of the ACM, Vol 19, No 5, pp 236-242, May 1976
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Dorothy, R.1    Denning2
  • 13
    • 0016081584 scopus 로고
    • Protection and the control of information sharing in multics
    • July
    • J. H. Saltzer, "Protection and the Control of Information Sharing in Multics", Communications of the ACM, Vol 17, No 7, pp 388-402, July 1974
    • (1974) Communications of the ACM , vol.17 , Issue.7 , pp. 388-402
    • Saltzer, J.H.1
  • 14
    • 0019548112 scopus 로고
    • Formal models of capability-based protection systems
    • March
    • L, Snyder, "Formal Models of Capability-based Protection Systems"IEEE Transactions on Computers, vC-30 n3, March 1981, pp 172-181
    • (1981) IEEE Transactions on Computers, vC-30 n3 , pp. 172-181
    • Snyder, L.1
  • 16
    • 0019612720 scopus 로고
    • Verifying security
    • Sept
    • C. Landwehr, "Verifying Security", Computing Surveys, Vol.13, No. 3, Sept. 1981
    • (1981) Computing Surveys , vol.13 , Issue.3
    • Landwehr, C.1
  • 18
    • 0023348314 scopus 로고
    • The Development and Proof of a Formal Specification for a Multilevel Secure System
    • May
    • J. I. Glasgow, G. H. MacEwen, "The Development and Proof of a Formal Specification for a Multilevel Secure System, ACM Transactions on Computer Systems, Vol. 5, No 2, May 1987, pp 151-184
    • (1987) ACM Transactions on Computer Systems , vol.5 , Issue.2 , pp. 151-184
    • Glasgow, J.I.1    MacEwen, G.H.2
  • 19
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-key cryptosystems", Communications of ACM, vol. 21, no. 2 Feb. 1978, pp. 120-126
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.