Next: About this document ...
Up: Representation and Evaluation of
Previous: Acknowledgments
- 1
-
B.C. Neuman.
Proxy-based authorization and accounting for
distributed systems.
Proceedings of the 13th International Conference
on Distributed Computing Systems, Pittsburgh, May 1993.
- 2
-
B.C. Neuman and T. Ts'o.
Kerberos: An authentication service for computer
networks.
IEEE Communications Magazine, pages 33-38,
September 1994.
- 3
-
T.Y.C. Woo and S.S. Lam.
Designing a Distributed Authorization Service.
In Procedings IEEE INFOCOM '98, San Francisco, March 1998.
- 4
-
S. Jajodia, P. Samarati and V.S. Subrahmanian.
A logical Language for Expressing Authorizations
Proceedings of the 1997 IEEE Symposium on Security and Privacy,
1997.
- 5
-
M. Abadi, M. Burrows, B. Lampson and G. Plotkin
A calculus for Access Control in Distributed Systems.
ACM Transactions on Programming Languages and Systems, Vol. 15, No 4, Pages 706-734, September 1993.
- 6
-
R. T. Simon and M. E. Zurko
Separation of Duty in Role-Based Environments
Computer Security Foundations Workshop, June 1997.
- 7
-
N. Nagaratnam and S.B. Byrne.
Resource access control for internet user agent.
Proceedings of the third USENIX Conference on
Object-Oriented Technologies and Systems, Portland, Oregon, June 1997.
- 8
-
L. Gong and R. Schemers.
Implementing Protection Domains in the Java Development
Kit 1.2.
Proceedings of Network and Distributed System
Security Symposium, San Diego, California, March 1998.
- 9
-
M. Blaze, J. Feigenbaum and J. Lacy.
Decentralized Trust Management.
in Proc. IEEE Symp. on Security and Privacy, IEEE
Computer Press, Los Angeles, pages 164-173, 1996.
- 10
-
R. S. Shandhu, E. J. Coyne, Hal L. Feinstein and C. E. Youman
Role-Based Access Control : A Multi-Dimensional View.
Proc. of 10th Annual Computer Security Applications Conference, December 5-9, pages 54-62, 1994.
- 11
-
W. Shen and P. Dewan
Access Control for Collaborative Environments.
Proc. of CSCW, November, 1992, pages 51-58
- 12
-
D.D. Clark. and D.R. Wilson
Non Discretionary Controls Commercial Applications.
Proc. of the IEEE Symposium on Security and Privacy,
pages 184-194, April 1997.
- 13
-
S.B. Lipner
A Comparison of Commercial and Military Computer Security Policies.
Proc. of the 1987 IEEE Symposium on Security and Privacy, 1982.
- 14
-
D. Elliott Bell and L. J. LaPadula
Secure Computer System: Unified Exposition and Multics
Interpretation, ESD-TR-75-306 (MTR-2997), The MITRE Corporation
Bedford, Massachusetts, July 1975.
- 15
-
K. J. Biba
Integrity Considerations for Secure Computer Systems,
The MITRE Corporation, Bedford, MA, MTR-3153, 30 June 1975.
- 16
-
The Asynchronous Reliable Delivery Protocol.
http://gost.isi.edu/info/ardp
- 17
-
Edited by I. Foster and C. Kesselman.
The GRID: Blueprint for a New Computing Infrastructure
Morgan Kauffman Publishers, 1999.
- 18
-
I. Foster and C. Kesselman.
Globus: A metacomputing infrastructure toolkit.
International Journal of Supercomputer Applications,
Summer 1997.
Tatyana Ryutov
2002-06-25