메뉴 건너뛰기




Volumn , Issue , 1998, Pages 118-125

Escaping the evils of centralized control with self-certifying pathnames

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84974618852     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/319195.319213     Document Type: Conference Paper
Times cited : (24)

References (17)
  • 1
    • 0003515822 scopus 로고    scopus 로고
    • Explicit communication revisited: Two new examples
    • March
    • Martín Abadi. Explicit communication revisited: Two new examples. IEEE Transactions on Software Engineering, SE-23(3):185-186, March 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.SE-23 , Issue.3 , pp. 185-186
    • Abadi, M.1
  • 4
    • 0003629991 scopus 로고
    • FIPS 180-1, U. S. Department of Commerce/N. I. S. T, National Tecnical Information Service, Springfield, VA, April
    • FIPS 180-1. Secure Hash Standard. U. S. Department of Commerce/N. I. S. T, National Tecnical Information Service, Springfield, VA, April 1995.
    • (1995) Secure Hash Standard
  • 6
    • 0028374136 scopus 로고
    • File system development with stackable layers
    • February
    • John S. Heidemann and Gerald J. Popek. File system development with stackable layers. ACM Transactions on Computer Systems, 12(1):58-89, February 1994.
    • (1994) ACM Transactions on Computer Systems , vol.12 , Issue.1 , pp. 58-89
    • Heidemann, J.S.1    Popek, G.J.2
  • 14
    • 0042985426 scopus 로고
    • Scalable, secure and highly available file access in a distributed workstation environment
    • May
    • M. Satyanarayanan. Scalable, secure and highly available file access in a distributed workstation environment. IEEE Computer, pages 9-21, May 1990.
    • (1990) IEEE Computer , pp. 9-21
    • Satyanarayanan, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.