-
1
-
-
85029688731
-
Transis: A communication sub-system for high availability
-
IEEE, New York
-
AMIR, Y., DOLEV, D., KRAMER, S., AND MALKI, D. 1992. Transis: A communication sub-system for high availability. In Proceedings of the 22nd International Symposium on Fault-Tolerant Computing. IEEE, New York, 76-84.
-
(1992)
Proceedings of the 22nd International Symposium on Fault-Tolerant Computing
, pp. 76-84
-
-
AMIR, Y.1
DOLEV, D.2
KRAMER, S.3
MALKI, D.4
-
2
-
-
0000874415
-
Limitations of the Kerberos authentication system
-
(Oct.)
-
BELLOVIN, S. M., AND MERRITT, M. 1990. Limitations of the Kerberos authentication system. Comput. Commun. Rev. 20, 5 (Oct.), 119-132.
-
(1990)
Comput. Commun. Rev.
, vol.20
, Issue.5
, pp. 119-132
-
-
BELLOVIN, S.M.1
MERRITT, M.2
-
3
-
-
84987193155
-
Exploiting virtual synchrony in distributed systems
-
a, ACM, New York
-
BIRMAN, K. P., AND JOSEPH, T. A. 1987a. Exploiting virtual synchrony in distributed systems. In Proceedings of the 11th Symposium on Operating Systems Principles. ACM, New York, 123-138.
-
(1987)
Proceedings of the 11th Symposium on Operating Systems Principles
, pp. 123-138
-
-
BIRMAN, K.P.1
JOSEPH, T.A.2
-
5
-
-
0023287946
-
Reliable communication in the presence of failures
-
b, (Feb.)
-
BIRMAN, K. P., AND JOSEPH, T. A. 1987b. Reliable communication in the presence of failures. ACM Trans. Comput. Syst. 5, 1 (Feb.), 44-76.
-
(1987)
ACM Trans. Comput. Syst.
, vol.5
, Issue.1
, pp. 44-76
-
-
BIRMAN, K.P.1
JOSEPH, T.A.2
-
6
-
-
84976814834
-
Lightweight causal and atomic group multicast
-
(Aug.)
-
BIRMAN, K. P., SCHIPER, A., AND STEPHENSON, P. 1991. Lightweight causal and atomic group multicast. ACM Trans. Comput. Syst. 9, 3 (Aug.), 272-314.
-
(1991)
ACM Trans. Comput. Syst.
, vol.9
, Issue.3
, pp. 272-314
-
-
BIRMAN, K.P.1
SCHIPER, A.2
STEPHENSON, P.3
-
7
-
-
0011917214
-
-
International Telegraph and Telephone Consultative Committee, Geneva, Switzerland.
-
CCITT. 1988. The directory-authentication framework, Recommendation X.509. International Telegraph and Telephone Consultative Committee, Geneva, Switzerland.
-
(1988)
The directory-authentication framework, Recommendation X.509
-
-
-
8
-
-
0022067076
-
Distributed process groups in the V kernel
-
(May)
-
CHERITON, D. R., AND ZWAENEPOEL, W. 1985. Distributed process groups in the V kernel. ACM Trans. Comput. Syst. 3, 2 (May), 77-107.
-
(1985)
ACM Trans. Comput. Syst.
, vol.3
, Issue.2
, pp. 77-107
-
-
CHERITON, D.R.1
ZWAENEPOEL, W.2
-
9
-
-
0024946716
-
Probabilistic clock synchronization
-
CRISTIAN, F. 1989. Probabilistic clock synchronization. Distrib. Comput. 3, 3, 146-158.
-
(1989)
Distrib. Comput.
, vol.3
, Issue.3
, pp. 146-158
-
-
CRISTIAN, F.1
-
10
-
-
84976665942
-
Timestamps in key distribution protocols
-
(Aug.)
-
DENNING, D. E., AND SACCO, G. M. 1981. Timestamps in key distribution protocols. Commun. ACM 24, 8 (Aug.), 533-536.
-
(1981)
Commun. ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
DENNING, D.E.1
SACCO, G.M.2
-
12
-
-
85022187530
-
Shared generation of authenticators and signatures
-
J. Feigenbaum, Ed. Lecture Notes in Computer Science, Springer-Verlag, New York
-
DESMEDT, Y., AND FRANKEL, Y. 1992. Shared generation of authenticators and signatures. In Advances in Cryptology-CRYPTO '91 Proceedings, J. Feigenbaum, Ed. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, 457-469.
-
(1992)
Advances in Cryptology-CRYPTO '91 Proceedings
, vol.576
, pp. 457-469
-
-
DESMEDT, Y.1
FRANKEL, Y.2
-
13
-
-
0018443381
-
Privacy and authentication: An introduction to cryptography
-
(Mar.)
-
DIFFIE, W., AND HELLMAN, M. E. 1979. Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 3 (Mar.), 397-427.
-
(1979)
Proc. IEEE
, vol.67
, Issue.3
, pp. 397-427
-
-
DIFFIE, W.1
HELLMAN, M.E.2
-
14
-
-
67650674871
-
Secure management of SNMP networks
-
Elsevier Science Publishers B.V. (North-Holland), Amsterdam
-
GALVIN, J. M., MCCLOGHRIE, K., AND DAVIN, J. R. 1991. Secure management of SNMP networks. In Integrated Network Management. Vol. 2. Elsevier Science Publishers B.V. (North-Holland), Amsterdam.
-
(1991)
Integrated Network Management
, vol.2
-
-
GALVIN, J.M.1
MCCLOGHRIE, K.2
DAVIN, J.R.3
-
15
-
-
0027617271
-
Increasing availability and security of an authentication service
-
11, 5, (June)
-
GONG, L. 1993. Increasing availability and security of an authentication service. IEEE J. Sel. Areas Commun. 11, 5, (June), 657-662.
-
(1993)
IEEE J. Sel. Areas Commun.
, pp. 657-662
-
-
GONG, L.1
-
16
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
(Jan.)
-
GONG, L. 1992. A security risk of depending on synchronized clocks. ACM Oper. Syst. Rev. 26, 1 (Jan.), 49-53.
-
(1992)
ACM Oper. Syst. Rev.
, vol.26
, Issue.1
, pp. 49-53
-
-
GONG, L.1
-
17
-
-
0002783180
-
Using one-way functions for authentication
-
(Oct.)
-
GONG, L. 1989. Using one-way functions for authentication. Comput. Commun. Rev. 19, 5 (Oct.), 8-11.
-
(1989)
Comput. Commun. Rev.
, vol.19
, Issue.5
, pp. 8-11
-
-
GONG, L.1
-
18
-
-
84976698771
-
TEMPO-A network time controller for a distributed Berkeley UNIX system
-
USENIX Assoc., Berkeley, Calif.
-
GUSELLA, R., AND ZATTI, S. 1984. TEMPO-A network time controller for a distributed Berkeley UNIX system. In Proceedings of the USENIX Summer Conference. USENIX Assoc., Berkeley, Calif., 78-85.
-
(1984)
Proceedings of the USENIX Summer Conference
, pp. 78-85
-
-
GUSELLA, R.1
ZATTI, S.2
-
19
-
-
84977284109
-
How to make replicated data secure
-
C. Pomerance, Ed. Lecture Notes in Computer Science, Springer-Verlag, New York
-
HERLIHY, M. P., AND TYGAR, J. D. 1988. How to make replicated data secure. In Advances in Cryptology-CRYPTO '87 Proceedings, C. Pomerance, Ed. Lecture Notes in Computer Science, vol. 293. Springer-Verlag, New York, 379-391.
-
(1988)
Advances in Cryptology-CRYPTO '87 Proceedings
, vol.293
, pp. 379-391
-
-
HERLIHY, M.P.1
TYGAR, J.D.2
-
20
-
-
2342660026
-
Towards the elimination of the effects of malicious logic: Fault tolerance approaches
-
NBS/NCSC, Baltimore, Md.
-
JOSEPH, M. K. 1987. Towards the elimination of the effects of malicious logic: Fault tolerance approaches. In Proceedings of the 10th NBS/NCSC National Computer Security Conference. NBS/NCSC, Baltimore, Md., 238-244.
-
(1987)
Proceedings of the 10th NBS/NCSC National Computer Security Conference
, pp. 238-244
-
-
JOSEPH, M.K.1
-
22
-
-
0040268965
-
Internet privacy enhanced mail
-
(Aug.)
-
KENT, S. T. 1993. Internet privacy enhanced mail. Commun. ACM 36, 8 (Aug.), 48-60.
-
(1993)
Commun. ACM
, vol.36
, Issue.8
, pp. 48-60
-
-
KENT, S.T.1
-
23
-
-
0342830668
-
CryptoLib: Cryptography in software
-
USENIX Assoc., Berkeley, Calif.
-
LACY, J. B., MITCHELL, D. P., AND SCHELL, W. M. 1993, CryptoLib: Cryptography in software. In Proceedings of the 4th USENIX Security Workshop. USENIX Assoc., Berkeley, Calif., 1-17.
-
(1993)
Proceedings of the 4th USENIX Security Workshop
, pp. 1-17
-
-
LACY, J.B.1
MITCHELL, D.P.2
SCHELL, W.M.3
-
24
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
(July)
-
LAMPORT, L. 1978. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (July), 558-565.
-
(1978)
Commun. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
LAMPORT, L.1
-
25
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
(Nov.)
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
LAMPSON, B.1
ABADI, M.2
BURROWS, M.3
WOBBER, E.4
-
26
-
-
84976743475
-
Tolerating failures of continuous-valued sensors
-
(Nov.)
-
MARZULLO, K. 1990. Tolerating failures of continuous-valued sensors. ACM Trans. Comput. Syst. 8, 4 (Nov.), 284-304.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.4
, pp. 284-304
-
-
MARZULLO, K.1
-
27
-
-
0003871309
-
RFC 1119: Network Time Protocol (version 2) specification and implementation
-
Internet Activities Board. Sept
-
MILLS, D. L. 1989. RFC 1119: Network Time Protocol (version 2) specification and implementation. Internet Activities Board. Sept.
-
(1989)
-
-
MILLS, D.L.1
-
28
-
-
84969337256
-
-
Federation Information Processing Standards Publication 46, Government Printing Office, Washington, D.C.
-
NATIONAL BUREAU OF STANDARDS 1977. Data encryption standard. Federation Information Processing Standards Publication 46, Government Printing Office, Washington, D.C.
-
(1977)
Data encryption standard
-
-
-
29
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
(Dec.)
-
NEEDHAM, R. M., AND SCHROEDER, M. D. 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec.), 993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
NEEDHAM, R.M.1
SCHROEDER, M.D.2
-
30
-
-
0024716226
-
Preserving and using context information in interprocess communication
-
(Aug.)
-
PETERSON, L. L., BUCHHOLZ, N. C., AND SCHLICHTING, R. D. 1989. Preserving and using context information in interprocess communication. ACM Trans. Comput. Syst. 7, 3 (Aug.), 217-246.
-
(1989)
ACM Trans. Comput. Syst.
, vol.7
, Issue.3
, pp. 217-246
-
-
PETERSON, L.L.1
BUCHHOLZ, N.C.2
SCHLICHTING, R.D.3
-
33
-
-
0028429699
-
How to securely replicate services
-
(May)
-
REITER, M. K., AND BIRMAN, K. P. 1994. How to securely replicate services. ACM Trans. Program. Lang. Syst. 16, 3 (May), 986-1009.
-
(1994)
ACM Trans. Program. Lang. Syst.
, vol.16
, Issue.3
, pp. 986-1009
-
-
REITER, M.K.1
BIRMAN, K.P.2
-
35
-
-
0026851635
-
Integrating security in a group oriented distributed system
-
IEEE, New York
-
REITER, M. K., BIRMAN, K. P., AND GONG, L. 1992. Integrating security in a group oriented distributed system. In Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy. IEEE, New York, 18-32.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy
, pp. 18-32
-
-
REITER, M.K.1
BIRMAN, K.P.2
GONG, L.3
-
36
-
-
78650922644
-
The MD4 message digest algorithm
-
A. J. Menezes and S. A. Vanstone, Eds. Lecture Notes in Computer Science, Springer-Verlag, New York
-
RIVEST, R. L. 1991. The MD4 message digest algorithm. In Advances in Cryptology-CRYPTO '90 Proceedings, A. J. Menezes and S. A. Vanstone, Eds. Lecture Notes in Computer Science, vol. 537. Springer-Verlag, New York, 303-311.
-
(1991)
Advances in Cryptology-CRYPTO '90 Proceedings
, vol.537
, pp. 303-311
-
-
RIVEST, R.L.1
-
37
-
-
0003602325
-
RFC 1321: The MD5 message-digest algorithm
-
Internet Activities Board
-
RIVEST, R. L., AND DUSSE, S. 1992. RFC 1321: The MD5 message-digest algorithm. Internet Activities Board.
-
(1992)
-
-
RIVEST, R.L.1
DUSSE, S.2
-
38
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
(Feb.)
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120-126.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
RIVEST, R.L.1
SHAMIR, A.2
ADLEMAN, L.3
-
39
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
(Dec.)
-
SCHNEIDER, F. B. 1990. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comput. Surv. 22, 4 (Dec.), 299-319.
-
(1990)
ACM Comput. Surv.
, vol.22
, Issue.4
, pp. 299-319
-
-
SCHNEIDER, F.B.1
-
40
-
-
0001857259
-
An overview of clock synchronization
-
B. Simons and A, Spector, Eds. Lecture Notes in Computer Science, Springer-Verlag, New York
-
SIMONS, B., WELCH, J. L., AND LYNCH, N. 1990. An overview of clock synchronization. In Fault-Tolerant Distributed Computing, B. Simons and A, Spector, Eds. Lecture Notes in Computer Science, vol. 448. Springer-Verlag, New York, 84-96.
-
(1990)
Fault-Tolerant Distributed Computing
, vol.448
, pp. 84-96
-
-
SIMONS, B.1
WELCH, J.L.2
LYNCH, N.3
-
41
-
-
33750646406
-
-
Tech. Rep. CMU-CS-93-116, School of Computer Science, Carnegie Mellon Univ., Pittsburgh, Pa
-
SMITH, S., AND TYGAR, J. D. 1993. Signed vector timestamps: A secure protocol for partial order time. Tech. Rep. CMU-CS-93-116, School of Computer Science, Carnegie Mellon Univ., Pittsburgh, Pa.
-
(1993)
Signed vector timestamps: A secure protocol for partial order time
-
-
SMITH, S.1
TYGAR, J.D.2
-
42
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
USENIX Assoc., Berkeley, Calif.
-
STEINER, J. G., NEUMAN, C., AND SCHILLER, J. I. 1988. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter Conference. USENIX Assoc., Berkeley, Calif., 191-202.
-
(1988)
Proceedings of the USENIX Winter Conference
, pp. 191-202
-
-
STEINER, J.G.1
NEUMAN, C.2
SCHILLER, J.I.3
-
45
-
-
0026973508
-
Message authentication with one-way hash functions
-
IEEE, New York
-
TSUDIK, G. 1992. Message authentication with one-way hash functions. In Proceedings of IEEE INFOCOM '92. IEEE, New York, 2055-2059.
-
(1992)
Proceedings of IEEE INFOCOM '92
, pp. 2055-2059
-
-
TSUDIK, G.1
-
46
-
-
0003156767
-
Heilman presents no shortcut solutions to the DES
-
(July)
-
TUCHMAN, W. 1979. Heilman presents no shortcut solutions to the DES. IEEE Spectrum 16, 7 (July), 40-41.
-
(1979)
IEEE Spectrum
, vol.16
, Issue.7
, pp. 40-41
-
-
TUCHMAN, W.1
-
47
-
-
84949000404
-
On the interactions of security and fault-tolerance
-
NBS-NCSC, Baltimore, Md.
-
TURN, R., AND HABIBI, J. 1986. On the interactions of security and fault-tolerance. In Proceedings of the 9th NBS/NCSC National Computer Security Conference. NBS-NCSC, Baltimore, Md., 138-142.
-
(1986)
Proceedings of the 9th NBS/NCSC National Computer Security Conference
, pp. 138-142
-
-
TURN, R.1
HABIBI, J.2
-
48
-
-
84952566785
-
Strongbox
-
J. L. Eppinger, L. B. Mummert, and A. Z. Spector, Eds. Morgan Kaufmann, San Mateo, Calif.
-
TYGAR, J. D., AND YEE, B. S. 1991. Strongbox. In Camelot and Avalon, A Distributed Transaction Facility, J. L. Eppinger, L. B. Mummert, and A. Z. Spector, Eds. Morgan Kaufmann, San Mateo, Calif., 381-400.
-
(1991)
Camelot and Avalon, A Distributed Transaction Facility
, pp. 381-400
-
-
TYGAR, J.D.1
YEE, B.S.2
-
49
-
-
84976660265
-
Reliable multicast between microkernels
-
USENIX Assoc., Berkeley, Calif.
-
VAN RENESSE, R., BIRMAN, K., COOPER, R., GLADE, B., AND STEPHENSON, P. 1992. Reliable multicast between microkernels. In Proceedings of the USENIX Microkernels and Other Kernel Architectures Workshop. USENIX Assoc., Berkeley, Calif.
-
(1992)
Proceedings of the USENIX Microkernels and Other Kernel Architectures Workshop
-
-
VAN RENESSE, R.1
BIRMAN, K.2
COOPER, R.3
GLADE, B.4
STEPHENSON, P.5
-
50
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
(June)
-
VOYDOCK, V. L., AND KENT, S. T. 1983. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (June), 135-171.
-
(1983)
ACM Comput. Surv.
, vol.15
, Issue.2
, pp. 135-171
-
-
VOYDOCK, V.L.1
KENT, S.T.2
-
51
-
-
0027809739
-
Authentication in the Taos operating system
-
ACM, New York
-
WOBBER, E., ABADI, M., BURROWS, M., AND LAMPSON, B. 1993. Authentication in the Taos operating system. In Proceedings of the 14th ACM Symposium on Operating Systems Principles. ACM, New York, 256-269.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles
, pp. 256-269
-
-
WOBBER, E.1
ABADI, M.2
BURROWS, M.3
LAMPSON, B.4
|