-
1
-
-
84870804181
-
-
Apache Software Foundation. Apache web server, http://www.pache.org.
-
Apache Web Server
-
-
-
5
-
-
0003556051
-
-
Draft aper, November
-
D. Clarke, J. Elien, C. Ellison, F. Morcos and R. Rivest. Certificate chain discovery i / SDS. Draft aper, November 1999.
-
(1999)
Certificate Chain Discovery I / SDS
-
-
Clarke, D.1
Elien, J.2
Ellison, C.3
Morcos, F.4
Rivest, R.5
-
9
-
-
85077760264
-
-
Dousti software at Carnegie Mellon University
-
Dousti. Project Minotaur: Kerberizing the Web, software at Carnegie Mellon University. http://andrew2.andrew.cmu.edu/minotaur.
-
Project Minotaur: Kerberizing the Web
-
-
-
10
-
-
0003593599
-
-
September RFC 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest B. Thomas, and T. Ylonen. SPKI certificate theory, September 1999. RFC 2693.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
11
-
-
0041915634
-
-
ITU-T (formerly CCTT) Information technology Open Systems Interconnection December
-
ITU-T (formerly CCTT) Information technology Open Systems Interconnection. Recommendation X.509: The directory authentication framework, December 1988.
-
(1988)
Recommendation X.509: The Directory Authentication Framework
-
-
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. Needham and M. Shroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Shroeder, M.2
-
19
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
C. Neuman and T. Tso. Kerberos: an authentication service for computer networks. IEEE Communications 32(9):33-38, September 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, C.1
Tso, T.2
-
21
-
-
0003614529
-
SDSI - A simple distributed security infrastructure
-
resented at
-
R. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure. resented at CRYTO'96 Rump session, 1996.
-
(1996)
CRYTO'96 Rump Session
-
-
Rivest, R.1
Lampson, B.2
-
22
-
-
0017930809
-
A method of obtaining digital signatures and public key cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman. A method of obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21:120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
84962274513
-
Representation and evaluation of security policies for distributed system services
-
January
-
T. Ryutov and C. Neuman. Representation and evaluation of security policies for distributed system services In Proceedings of the DISCEX, January 2000.
-
(2000)
Proceedings of the DISCEX
-
-
Ryutov, T.1
Neuman, C.2
-
26
-
-
85077735582
-
-
June rivate communication
-
V. Staats. Kerberized TLS, June 2000. rivate communication.
-
(2000)
Kerberized TLS
-
-
Staats, V.1
-
27
-
-
85077760475
-
-
Stone Cold Software. Apache Kerberos Module. http://stonecold.unity.ncsu.edu
-
Apache Kerberos Module
-
-
-
28
-
-
85084164318
-
Certificate based access control for widely distributed resources
-
August
-
M. Thompson, W. Johnson, S. Mudumbai G. Hoo, K. Jackson, and A. Essiari. Certificate based access control for widely distributed resources. In Proceedings of the 8th USENIX Security Symposium, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Thompson, M.1
Johnson, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
|