Check out the new USENIX Web site. next up previous
Next: About this document ... Up: The CRISIS Wide Area Architecture Previous: Acknowledgments

References

Birrell et al. 1986
A. Birrell, B. Lampson, R. Needham, and M.Schroeder.
``Global authentication without global trust''.
In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 1986.

Con 1989
Consultation Committee, International Telephone and Telegraph, International Telecommunications Union.
The Directory-Authentication Framework, 1989.
CCITT Recommendation X.509.

Crispo & Lomas 1996
B. Crispo and M. Lomas.
``A Certification Scheme for Electronic Commerce''.
In Security Protocols International Workshop, pp. 19-32, Cambridge UK, April 1996. Springer-Verlag LNCS series vol. 1189.

Dean et al. 1996
D. Dean, E. Felten, and D. Wallach.
``Java Security: From HotJava to Netscape and Beyond''.
In Proceedings of the IEEE Symposium on Security and Privacy, 1996.

Dig 1995
Digital Equipment Corporation.
Alta Vista, 1995.
https://www.altavista.digital.com/.

Fiat & Shamir 1987
A. Fiat and A. Shamir.
``How to prove yourself: Practical solutions to identification and signature problems''.
In Advances in Cryptology - Crypto '86, pp. 186-194. Springer-Verlag, 1987.

Goldberg et al. 1996
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer.
``A Secure Environment for Untrusted Helper Applications''.
In Proceedings of the Sixth USENIX Security Symposium, July 1996.

Hickman & Elgamal 1995
K. Hickman and T. Elgamal.
``The SSL Protocol''.
In Internet RFC Draft, 1995.

Howard et al. 1988
J. Howard, M. Kazar, S. Menees, D. Nichols, M. Satyanarayanan, R. Sidebotham, and M. West.
``Scale and Performance in a Distributed File System''.
ACM Transactions on Computer Systems, 6(1):51-82, February 1988.

Jaeger & Prakash 1995
T. Jaeger and A. Prakash.
``Implementation of a Discretionary Access Control Model for Script-based Systems''.
In Proc. of the 8th IEEE Computer Security Foundations Workshop, pp. 70-84, June 1995.

Kistler & Satyanarayanan 1992
J. J. Kistler and M. Satyanarayanan.
``Disconnected Operation in the Coda File System''.
ACM Transactions on Computer Systems, 10(1):3-25, February 1992.

Kleiman 1986
S. R. Kleiman.
``Vnodes: An Architecture For Multiple File System Types in SUN UNIX''.
In Proceedings of the 1986 USENIX Summer Technical Conference, pp. 238-247, 1986.

Lampson et al. 1991
B. Lampson, M. Abadi, M. Burrows, and E. Wobber.
``Authentication in Distributed Systems: Theory and Practice''.
In The 13th ACM Symposium on Operating Systems Principles, pp. 165-182, October 1991.

Neuman 1993
B. C. Neuman.
``Proxy-Based Authorization and Accounting for Distributed Systems''.
In Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993.

Rivest & Lampson 1996
R. L. Rivest and B. Lampson.
``SDSI-A Simple Distributed Security Infrastructure''.
https://theory.lcs.mit.edu/ cis/sdsi.html, 1996.

Sirer et al. 1997
E. G. Sirer, S. McDirmid, B. Pandey, and B. N. Bershad.
``Kimera: A Java System Architecture''.
https://kimera.cs.washington.edu/, 1997.

Steiner et al. 1988
J. G. Steiner, B. C. Neuman, and J. I. Schiller.
``Kerberos: an authentication service for open network systems''.
In Usenix Conference Proceedings, Dallas, Texas, February 1988.

Tennenhouse & Wetherall 1996
D. Tennenhouse and D. Wetherall.
``Towards an Active Network Architecture''.
In ACM SIGCOMM Computer Communication Review, pp. 5-18, April 1996.

Vahdat et al. 1997
A. Vahdat, P. Eastham, C. Yoshikawa, E. Belani, T. Anderson, D. Culler, and M. Dahlin.
``WebOS: Operating System Services For Wide Area Applications''.
UCB Technical Report CSD-97-938, December 1997.

Walsh et al. 1985
D. Walsh, B. Lyon, G. Sager, J. M. Chang, D. Goldberg, S. Kleiman, T. Lyon, R. Sandberg, and P. Weiss.
``Overview of the Sun Network File System''.
In Proceedings of the 1985 USENIX Winter Conference, pp. 117-124, January 1985.

Wobber et al. 1993
E. Wobber, M. Abadi, M. Burrows, and B. Lampson.
``Authentication in the Taos Operating System''.
In Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, pp. 256-269, December 1993.

Wulf et al. 1995
W. A. Wulf, C. Wang, and D. Kienzle.
``A New Model of Security for Distributed Systems''.
University of Virginia CS Technical Report CS-95-34, August 1995.



Amin Vahdat
12/10/1997