Next: About this document ...
Up: An Authorization Framework for
Previous: Acknowledgments
-
- 1
-
B.C. Neuman and S. Rao.
The Prospero Resource Manager: A Scalable Framework for
Processor Allocation in Distributed Systems
Concurrency: Practice and Experience, 6(4): 339-355, June 1994.
- 2
-
B.C. Neuman.
Proxy-based authorization and accounting for
distributed systems.
Proceedings of the 13th International Conference
on Distributed Computing Systems, Pittsburgh, May 1993.
- 3
-
B.C. Neuman and T. Ts'o.
Kerberos: An authentication service for computer
networks.
IEEE Communications Magazine, pages 33-38,
September 1994.
- 4
-
B.C. Neuman, S. Augart and S. Upasani.
Using Prospero to support integrated location-independent computing.
Proceedings of the Symposium on Mobile and
Location-independent Computing,
pages 29-34, August 1993.
- 5
-
T.Y.C. Woo and S.S. Lam.
A framework for distributed authorization.
Proceedings of the ACM Conference on Computer and
Communications Security, Fairfax, Virginia, November 1993.
- 6
-
M. Abadi, M. Burrows, B. Lampson and G. Plotkin.
A calculus for Access Control in Distributed Systems.
ACM Transactions on Programming Languages and Systems,
Vol. 15, No 4, pages 706-734, September 1993.
- 7
-
E. Belany, A. Vahdat, T. Anderson and M. Dahlin.
The CRISIS wide area security architecture.
Proceedings of the 7th USENUIX Security Symposium
San Antonio, Texas, January 1998.
- 8
-
Edited by I. Foster and C. Kesselman.
The GRID: Blueprint for a New Computing Infrastructure
Morgan Kauffman Publishers, 1999.
- 9
-
I. Foster and C. Kesselman.
Globus: A metacomputing infrastructure toolkit.
International Journal of Supercomputer Applications,
Summer 1997.
- 10
-
W. Shen and P. Dewan.
Access Control for Collaborative Environments.
Proceedings of the CSCW, November, 1992, pages 51-58
- 11
-
The Asynchronous Reliable Delivery Protocol.
http://gost.isi.edu/info/ardp
- 12
-
Technical Details about the HAARP Program.
http://w3.nrl.navy.mil/projects/
haarp/tech.html, October 1997.
- 13
-
S. B. Lipner.
Non-Discretionary Controls for Commercial Applications.
Proceedings IEEE Symposium on Security and Privacy, 1982.
- 14
-
IBM.
TME 10 security management.
http://www.tivoli.com/redbooks/html
/sg242021/2021fm.html,
October 1997.
- 15
-
W. Johnson and C. Larsen.
A use-condition centered approach to authenticated global
capabilities: Security architectures for large-scale distributed
collaboratory environments.
LBNL Report 38850
- 16
-
N. Nagaratnam and S.B. Byrne.
Resource access control for internet user agent.
Proceedings of the third USENIX Conference on
Object-Oriented Technologies and Systems, Portland, Oregon, June 1997.
Tatyana Ryutov
2002-06-25