Next: About this document ...
Up: The CRISIS Wide Area Architecture
Previous: Acknowledgments
- Birrell et al. 1986
-
A. Birrell, B. Lampson, R. Needham, and M.Schroeder.
``Global authentication without global trust''.
In Proceedings of the IEEE Symposium on Security and Privacy,
Oakland, California, May 1986.
- Con 1989
-
Consultation Committee, International Telephone and Telegraph, International
Telecommunications Union.
The Directory-Authentication Framework, 1989.
CCITT Recommendation X.509.
- Crispo & Lomas 1996
-
B. Crispo and M. Lomas.
``A Certification Scheme for Electronic Commerce''.
In Security Protocols International Workshop, pp. 19-32,
Cambridge UK, April 1996. Springer-Verlag LNCS series vol. 1189.
- Dean et al. 1996
-
D. Dean, E. Felten, and D. Wallach.
``Java Security: From HotJava to Netscape and Beyond''.
In Proceedings of the IEEE Symposium on Security and Privacy,
1996.
- Dig 1995
-
Digital Equipment Corporation.
Alta Vista, 1995.
https://www.altavista.digital.com/.
- Fiat & Shamir 1987
-
A. Fiat and A. Shamir.
``How to prove yourself: Practical solutions to identification and
signature problems''.
In Advances in Cryptology - Crypto '86, pp. 186-194.
Springer-Verlag, 1987.
- Goldberg et al. 1996
-
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer.
``A Secure Environment for Untrusted Helper Applications''.
In Proceedings of the Sixth USENIX Security Symposium, July
1996.
- Hickman & Elgamal 1995
-
K. Hickman and T. Elgamal.
``The SSL Protocol''.
In Internet RFC Draft, 1995.
- Howard et al. 1988
-
J. Howard, M. Kazar, S. Menees, D. Nichols, M. Satyanarayanan, R. Sidebotham,
and M. West.
``Scale and Performance in a Distributed File System''.
ACM Transactions on Computer Systems, 6(1):51-82, February
1988.
- Jaeger & Prakash 1995
-
T. Jaeger and A. Prakash.
``Implementation of a Discretionary Access Control Model for
Script-based Systems''.
In Proc. of the 8th IEEE Computer Security Foundations
Workshop, pp. 70-84, June 1995.
- Kistler & Satyanarayanan 1992
-
J. J. Kistler and M. Satyanarayanan.
``Disconnected Operation in the Coda File System''.
ACM Transactions on Computer Systems, 10(1):3-25, February
1992.
- Kleiman 1986
-
S. R. Kleiman.
``Vnodes: An Architecture For Multiple File System Types in SUN
UNIX''.
In Proceedings of the 1986 USENIX Summer Technical Conference,
pp. 238-247, 1986.
- Lampson et al. 1991
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber.
``Authentication in Distributed Systems: Theory and Practice''.
In The 13th ACM Symposium on Operating Systems Principles, pp.
165-182, October 1991.
- Neuman 1993
-
B. C. Neuman.
``Proxy-Based Authorization and Accounting for Distributed
Systems''.
In Proceedings of the 13th International Conference on
Distributed Computing Systems, May 1993.
- Rivest & Lampson 1996
-
R. L. Rivest and B. Lampson.
``SDSI-A Simple Distributed Security Infrastructure''.
https://theory.lcs.mit.edu/ cis/sdsi.html, 1996.
- Sirer et al. 1997
-
E. G. Sirer, S. McDirmid, B. Pandey, and B. N. Bershad.
``Kimera: A Java System Architecture''.
https://kimera.cs.washington.edu/, 1997.
- Steiner et al. 1988
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller.
``Kerberos: an authentication service for open network systems''.
In Usenix Conference Proceedings, Dallas, Texas, February 1988.
- Tennenhouse & Wetherall 1996
-
D. Tennenhouse and D. Wetherall.
``Towards an Active Network Architecture''.
In ACM SIGCOMM Computer Communication Review, pp. 5-18, April
1996.
- Vahdat et al. 1997
-
A. Vahdat, P. Eastham, C. Yoshikawa, E. Belani, T. Anderson, D. Culler, and M.
Dahlin.
``WebOS: Operating System Services For Wide Area Applications''.
UCB Technical Report CSD-97-938, December 1997.
- Walsh et al. 1985
-
D. Walsh, B. Lyon, G. Sager, J. M. Chang, D. Goldberg, S. Kleiman, T. Lyon, R.
Sandberg, and P. Weiss.
``Overview of the Sun Network File System''.
In Proceedings of the 1985 USENIX Winter Conference, pp.
117-124, January 1985.
- Wobber et al. 1993
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson.
``Authentication in the Taos Operating System''.
In Proceedings of the Fourteenth ACM Symposium on Operating
Systems Principles, pp. 256-269, December 1993.
- Wulf et al. 1995
-
W. A. Wulf, C. Wang, and D. Kienzle.
``A New Model of Security for Distributed Systems''.
University of Virginia CS Technical Report CS-95-34, August 1995.
Amin Vahdat
12/10/1997