next up previous
Next: About this document ... Up: Representation and Evaluation of Previous: Acknowledgments

Bibliography

1
B.C. Neuman.
Proxy-based authorization and accounting for distributed systems.
Proceedings of the 13th International Conference on Distributed Computing Systems, Pittsburgh, May 1993.

2
B.C. Neuman and T. Ts'o.
Kerberos: An authentication service for computer networks.
IEEE Communications Magazine, pages 33-38, September 1994.

3
T.Y.C. Woo and S.S. Lam.
Designing a Distributed Authorization Service.
In Procedings IEEE INFOCOM '98, San Francisco, March 1998.

4
S. Jajodia, P. Samarati and V.S. Subrahmanian.
A logical Language for Expressing Authorizations
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997.

5
M. Abadi, M. Burrows, B. Lampson and G. Plotkin
A calculus for Access Control in Distributed Systems.
ACM Transactions on Programming Languages and Systems, Vol. 15, No 4, Pages 706-734, September 1993.

6
R. T. Simon and M. E. Zurko
Separation of Duty in Role-Based Environments
Computer Security Foundations Workshop, June 1997.

7
N. Nagaratnam and S.B. Byrne.
Resource access control for internet user agent.
Proceedings of the third USENIX Conference on Object-Oriented Technologies and Systems, Portland, Oregon, June 1997.

8
L. Gong and R. Schemers.
Implementing Protection Domains in the Java Development Kit 1.2.
Proceedings of Network and Distributed System Security Symposium, San Diego, California, March 1998.

9
M. Blaze, J. Feigenbaum and J. Lacy.
Decentralized Trust Management.
in Proc. IEEE Symp. on Security and Privacy, IEEE Computer Press, Los Angeles, pages 164-173, 1996.

10
R. S. Shandhu, E. J. Coyne, Hal L. Feinstein and C. E. Youman
Role-Based Access Control : A Multi-Dimensional View.
Proc. of 10th Annual Computer Security Applications Conference, December 5-9, pages 54-62, 1994.

11
W. Shen and P. Dewan
Access Control for Collaborative Environments.
Proc. of CSCW, November, 1992, pages 51-58

12
D.D. Clark. and D.R. Wilson
Non Discretionary Controls Commercial Applications.
Proc. of the IEEE Symposium on Security and Privacy, pages 184-194, April 1997.

13
S.B. Lipner
A Comparison of Commercial and Military Computer Security Policies.
Proc. of the 1987 IEEE Symposium on Security and Privacy, 1982.

14
D. Elliott Bell and L. J. LaPadula
Secure Computer System: Unified Exposition and Multics Interpretation, ESD-TR-75-306 (MTR-2997), The MITRE Corporation Bedford, Massachusetts, July 1975.

15
K. J. Biba
Integrity Considerations for Secure Computer Systems, The MITRE Corporation, Bedford, MA, MTR-3153, 30 June 1975.

16

The Asynchronous Reliable Delivery Protocol.
http://gost.isi.edu/info/ardp

17
Edited by I. Foster and C. Kesselman.

The GRID: Blueprint for a New Computing Infrastructure
Morgan Kauffman Publishers, 1999.

18
I. Foster and C. Kesselman.

Globus: A metacomputing infrastructure toolkit.
International Journal of Supercomputer Applications, Summer 1997.



Tatyana Ryutov 2002-06-25