References
Next: About this document
Up: Secure Delegation for Distributed
Previous: Limitations
References
- 1
- M. Abadi
et al, ``A Calculus for Access Control in Distributed Systems'', ACM Transactions on Programming Languages and Systems, pp
706-734 Sept 1993.
- 2
- M.
Erdos, J. Pato, ``Extending the OSF DCE Authorization System to
Support Practical Delegation'', PSRG Workshop on Network and
Distributed System Security, Feb 1993.
- 3
- M. Franklin, and S. Zdonik, ``A Framework for
Scalable Dissemination-Based Systems'', Proceedings of OOPSLA
'97, pp Oct 1997.
- 4
- M. Gasser, E. McDermott, ``An Architecture for
Practical Delegation in a Distributed System'', Proceedings of
the 1990 IEEE Symposium on Security and Privacy, p20-30, May
1990.
- 5
- L. Gong, ``Java Security Architecture (JDK1.2),''
Draft document, Revision 0.5, available from Java Developer
Connection, https://java.sun.com .
- 6
- N. Nagaratnam, ``Secure Practical Delegation for
Distributed Object Environments,'' PhD Dissertation, Syracuse
University, 1997.
- 7
- Object Management Group, CORBA: Security
Service Specification
- 8
- T. Parker, D. Pinkas, ``Sesame
V4 - Overview'', Issue 1, Dec 1995.
- 9
- R. Sandhu et al., Role-Based Access Control
Models, IEEE Computer
- 10
- R. Sandhu et al., Role-Based Access Control,
Proc of 10th Annual Computer Security Applications Conference, 1994,
pp 54-62.
- 11
- R. Sandhu, and P. Samarati, ``Access
Control: Principles and Practice'', IEEE Computer, pp 40-48,
Sept 1994.
- 12
- Karen Sollins, ``Cascaded Authentication,'', Proceedings of the IEEE Symposium on Security and Privacy, IEEE
Computer Society, 1988, pp 156-163.
- 13
- J. Steiner et al, ``Kerberos: An authentication
service for open network systems'', Proceedings of the Usenix
Winter Conference, 1988, pp 191-202.
- 14
- Varadharajan et al., `` An Analysis of the Proxy
Problem in Distributed Systems'', Proceedings of the IEEE
Symposium on Security and Privacy, 1991, pp 255-275.
- 15
- Wobber, Abadi, Burrows, and Lampson, ``Authentication
in Taos Operating System'', ACM Transactions on Computer
Systems, Vol. 12, No. 1, February 1994.
- 16
- N. Nagaratnam, and S. B. Byrne, ``Resource Access Control for
an Internet User Agent'', Proceedings of the USENIX Conference on Object Oriented Technologies
and Systems '97, June 1997.
- 17
- A. Wollrath, R.
Riggs, and J. Waldo, ``A Distributed Object Model for the Java
System,'' Proceedings of the USENIX Conference on
Object-Oriented Technology and Systems '96, July 1996.
Nataraj Nagaratnam
Mon Mar 16 18:02:57 EST 1998