next up previous
Next: About this document ... Up: An Authorization Framework for Previous: Acknowledgments

Bibliography

1
B.C. Neuman and S. Rao.

The Prospero Resource Manager: A Scalable Framework for Processor Allocation in Distributed Systems
Concurrency: Practice and Experience, 6(4): 339-355, June 1994.

2
B.C. Neuman.

Proxy-based authorization and accounting for distributed systems.
Proceedings of the 13th International Conference on Distributed Computing Systems, Pittsburgh, May 1993.

3
B.C. Neuman and T. Ts'o.

Kerberos: An authentication service for computer networks.
IEEE Communications Magazine, pages 33-38, September 1994.

4
B.C. Neuman, S. Augart and S. Upasani.

Using Prospero to support integrated location-independent computing.
Proceedings of the Symposium on Mobile and Location-independent Computing, pages 29-34, August 1993.

5
T.Y.C. Woo and S.S. Lam.

A framework for distributed authorization.
Proceedings of the ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1993.

6
M. Abadi, M. Burrows, B. Lampson and G. Plotkin.

A calculus for Access Control in Distributed Systems.
ACM Transactions on Programming Languages and Systems, Vol. 15, No 4, pages 706-734, September 1993.

7
E. Belany, A. Vahdat, T. Anderson and M. Dahlin.

The CRISIS wide area security architecture.
Proceedings of the 7th USENUIX Security Symposium San Antonio, Texas, January 1998.

8
Edited by I. Foster and C. Kesselman.

The GRID: Blueprint for a New Computing Infrastructure
Morgan Kauffman Publishers, 1999.

9
I. Foster and C. Kesselman.

Globus: A metacomputing infrastructure toolkit.
International Journal of Supercomputer Applications, Summer 1997.

10
W. Shen and P. Dewan.

Access Control for Collaborative Environments.
Proceedings of the CSCW, November, 1992, pages 51-58

11
The Asynchronous Reliable Delivery Protocol.

http://gost.isi.edu/info/ardp

12
Technical Details about the HAARP Program.

http://w3.nrl.navy.mil/projects/
haarp/tech.html
, October 1997.

13
S. B. Lipner.

Non-Discretionary Controls for Commercial Applications.
Proceedings IEEE Symposium on Security and Privacy, 1982.

14
IBM.

TME 10 security management.
http://www.tivoli.com/redbooks/html
/sg242021/2021fm.html
, October 1997.

15
W. Johnson and C. Larsen.

A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments.
LBNL Report 38850

16
N. Nagaratnam and S.B. Byrne.

Resource access control for internet user agent.
Proceedings of the third USENIX Conference on Object-Oriented Technologies and Systems, Portland, Oregon, June 1997.



Tatyana Ryutov 2002-06-25