메뉴 건너뛰기




Volumn , Issue , 1998, Pages 167-177

Security architecture for a virtual heterogeneous machine

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 85018110200     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.1998.738611     Document Type: Conference Paper
Times cited : (4)

References (22)
  • 1
    • 85045306026 scopus 로고    scopus 로고
    • Global Security Services Application Programming Interface
    • Global Security Services Application Programming Interface, RFC 2078.
    • RFC 2078
  • 3
    • 85045309379 scopus 로고    scopus 로고
    • Intel Corporation, Santa Clara, CA release 1.2 edition February
    • Common Data Security Architecture Specification, Intel Corporation, Santa Clara, CA release 1.2 edition February 1998. http://developer.intel.com/ial/security/.
    • (1998) Common Data Security Architecture Specification
  • 4
    • 0004200684 scopus 로고
    • Technical Report ESD-TR-73-51, Airforce Electronic Systems Division, Hanscom AFB, Bedford, MA, DITCAD-758206, II DITCAD-772806
    • Anderson, J.P., Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, Airforce Electronic Systems Division, Hanscom AFB, Bedford, MA, 1972. (Also available as Vol. I, DITCAD-758206, Vol. II DITCAD-772806).
    • (1972) Computer Security Technology Planning Study , vol.1
    • Anderson, J.P.1
  • 5
    • 0013038328 scopus 로고
    • Technical Report CS-TR-92-1069, Computer Science Department, University of Wisconsin, Madison, WI, January
    • Bricker, A., Litzkow, M.,l and Livny, M., Condor Technical Summary, Technical Report CS-TR-92-1069, Computer Science Department, University of Wisconsin, Madison, WI, January 1992.
    • (1992) Condor Technical Summary
    • Bricker, A.1    Litzkow, M.L.2    Livny, M.3
  • 7
    • 85045334026 scopus 로고    scopus 로고
    • IT-21: The path to information superiority
    • July
    • Clemmins, A., IT-21: The path to Information Superiority, CHIPS, July 1997.
    • (1997) CHIPS
    • Clemmins, A.1
  • 13
    • 85045343380 scopus 로고
    • Using TNI concepts for the near term use of high assurance database management systems
    • Little Compton, RI, April
    • Irvine, C.E., Schell, R. R., and Thompson, M.F., Using TNI Concepts for the Near Term Use of High Assurance Database Management Systems. In Proceedings Fourth RADC Database Security Workshop, Little Compton, RI, April 1991.
    • (1991) Proceedings Fourth RADC Database Security Workshop
    • Irvine, C.E.1    Schell, R.R.2    Thompson, M.F.3
  • 19
    • 0031269037 scopus 로고    scopus 로고
    • From the i -Way to the national technology grid
    • Stevens, R., Woodward, P., DeFanti, T., and Catlett, C., From the I-Way to the National Technology Grid, Comm. A.C.M., 40(11):51-60, 1997.
    • (1997) Comm. A.C.M. , vol.40 , Issue.11 , pp. 51-60
    • Stevens, R.1    Woodward, P.2    DeFanti, T.3    Catlett, C.4
  • 22
    • 85045311515 scopus 로고    scopus 로고
    • June
    • Young, E. A., SSLeay, June 1997. ftp://ftp.psy.uq.oz.au/pub/Crypto/SSL.
    • (1997) SSLeay
    • Young, E.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.