Next: About this document ...
Up: An Authorization Framework for
B.C. Neuman and S. Rao.
The Prospero Resource Manager: A Scalable Framework for
Processor Allocation in Distributed Systems
Concurrency: Practice and Experience, 6(4): 339-355, June 1994.
Proxy-based authorization and accounting for
Proceedings of the 13th International Conference
on Distributed Computing Systems, Pittsburgh, May 1993.
B.C. Neuman and T. Ts'o.
Kerberos: An authentication service for computer
IEEE Communications Magazine, pages 33-38,
B.C. Neuman, S. Augart and S. Upasani.
Using Prospero to support integrated location-independent computing.
Proceedings of the Symposium on Mobile and
pages 29-34, August 1993.
T.Y.C. Woo and S.S. Lam.
A framework for distributed authorization.
Proceedings of the ACM Conference on Computer and
Communications Security, Fairfax, Virginia, November 1993.
M. Abadi, M. Burrows, B. Lampson and G. Plotkin.
A calculus for Access Control in Distributed Systems.
ACM Transactions on Programming Languages and Systems,
Vol. 15, No 4, pages 706-734, September 1993.
E. Belany, A. Vahdat, T. Anderson and M. Dahlin.
The CRISIS wide area security architecture.
Proceedings of the 7th USENUIX Security Symposium
San Antonio, Texas, January 1998.
Edited by I. Foster and C. Kesselman.
The GRID: Blueprint for a New Computing Infrastructure
Morgan Kauffman Publishers, 1999.
I. Foster and C. Kesselman.
Globus: A metacomputing infrastructure toolkit.
International Journal of Supercomputer Applications,
W. Shen and P. Dewan.
Access Control for Collaborative Environments.
Proceedings of the CSCW, November, 1992, pages 51-58
The Asynchronous Reliable Delivery Protocol.
Technical Details about the HAARP Program.
haarp/tech.html, October 1997.
S. B. Lipner.
Non-Discretionary Controls for Commercial Applications.
Proceedings IEEE Symposium on Security and Privacy, 1982.
TME 10 security management.
W. Johnson and C. Larsen.
A use-condition centered approach to authenticated global
capabilities: Security architectures for large-scale distributed
LBNL Report 38850
N. Nagaratnam and S.B. Byrne.
Resource access control for internet user agent.
Proceedings of the third USENIX Conference on
Object-Oriented Technologies and Systems, Portland, Oregon, June 1997.