References Check out the new USENIX Web site.



next up previous
Next: About this document Up: Secure Delegation for Distributed Previous: Limitations

References

1
M. Abadi et al, ``A Calculus for Access Control in Distributed Systems'', ACM Transactions on Programming Languages and Systems, pp 706-734 Sept 1993.

2
M. Erdos, J. Pato, ``Extending the OSF DCE Authorization System to Support Practical Delegation'', PSRG Workshop on Network and Distributed System Security, Feb 1993.

3
M. Franklin, and S. Zdonik, ``A Framework for Scalable Dissemination-Based Systems'', Proceedings of OOPSLA '97, pp Oct 1997.

4
M. Gasser, E. McDermott, ``An Architecture for Practical Delegation in a Distributed System'', Proceedings of the 1990 IEEE Symposium on Security and Privacy, p20-30, May 1990.

5
L. Gong, ``Java Security Architecture (JDK1.2),'' Draft document, Revision 0.5, available from Java Developer Connection, https://java.sun.com .

6
N. Nagaratnam, ``Secure Practical Delegation for Distributed Object Environments,'' PhD Dissertation, Syracuse University, 1997.

7
Object Management Group, CORBA: Security Service Specification

8
T. Parker, D. Pinkas, ``Sesame V4 - Overview'', Issue 1, Dec 1995.

9
R. Sandhu et al., Role-Based Access Control Models, IEEE Computer

10
R. Sandhu et al., Role-Based Access Control, Proc of 10th Annual Computer Security Applications Conference, 1994, pp 54-62.

11
R. Sandhu, and P. Samarati, ``Access Control: Principles and Practice'', IEEE Computer, pp 40-48, Sept 1994.

12
Karen Sollins, ``Cascaded Authentication,'', Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, 1988, pp 156-163.

13
J. Steiner et al, ``Kerberos: An authentication service for open network systems'', Proceedings of the Usenix Winter Conference, 1988, pp 191-202.

14
Varadharajan et al., `` An Analysis of the Proxy Problem in Distributed Systems'', Proceedings of the IEEE Symposium on Security and Privacy, 1991, pp 255-275.

15
Wobber, Abadi, Burrows, and Lampson, ``Authentication in Taos Operating System'', ACM Transactions on Computer Systems, Vol. 12, No. 1, February 1994.

16
N. Nagaratnam, and S. B. Byrne, ``Resource Access Control for an Internet User Agent'', Proceedings of the USENIX Conference on Object Oriented Technologies and Systems '97, June 1997.

17
A. Wollrath, R. Riggs, and J. Waldo, ``A Distributed Object Model for the Java System,'' Proceedings of the USENIX Conference on Object-Oriented Technology and Systems '96, July 1996.



Nataraj Nagaratnam
Mon Mar 16 18:02:57 EST 1998