Bela Ban Dept. of Computer Science. “JavaGroups—Group Communication Patterns in Java”. Jul. 31, 1998, p. 1-16.* |
Buschmann et al. “Pattern-Oriented Software Architecture, A System of Patterns”. Aug. 1996, p. 323-337.* |
Chung, Goopeel, et al.; Generic and Composable Latecomer Accommodation Service for Centralized Shared Systems; Seventh International Conference on Engineering for Human-Computer Interaction, EHCI '98; http://www.zmms.tuberlin.de/˜sandro/conferences/embed.en.phtml/ehci98; 16 pgs, 3 pgs introduction. |
Edwards, W. Keith; Session Management for Collaborative Applications; the Association of Computing Machinery; CSCW 94-10/94; Chapel Hill, NC, USA; © 1994 ACM 0-89791-689—1/94/0010; pp. 323-330. |
Girdley, Michael, et al.; Web Programming with JAVA™; Part 1, Chapter 1 An Overview Of Java; Jun. 01, 2001; cover page, 2 pages about Security Manager. |
Mates, Nathan, et al.; The Web meets MOOs, IRC and the MBone; Project Y Overview; California Institute of Technology; http://www.cs.caltech.edu/˜schooler/overview; 13 pgs. |
Schuckmann, Christian, et al.; Designing object-oriented synchronous groupware with COAST; http://citeseer.nj.nec.com/schuckmann96designing; pp. 1-10. |
CORBA Security Draft 0.2 of merged submission; Sep. 1995; OMG Document No. 95-9-1; cover page, pp. 2-120. |
JAVA Security; Chapter 4: The Security Manager Class; Using the Security Manager (Java Security) http://www.google.com/search?q=cac...2+and+%22socket+factories%22&hl=en; Aug. 27, 2001; pp. 1-19. |
Yialelis, Nicholas, et al., “A Security Framework Supporting Domain Based Access Control in Distributed Systems,” Imperial College Research Report No. DoC 95/14, Sep. 15, 1995, 18 pages, Department of Computing, Imperial College, London, UK. |
Yialelis, Nicholas, et al., “An Authentication Service Supporting Domain Based Access Control Policies,” Imperial College Research Report No. DoC 95/13, Sep. 15, 1995, 12 pages, Department of Computing, Imperial College, London, UK. |
Lupu, Emil C., et al., “A Policy Based Role Framework For Access Control,” First ACM/NIST Role Based Access Control Workshop, Gaithersburg, USA, Dec. 1995, 9 pages, Department of Computing, Imperial College, London, UK. |
Introduction to KeySAFE—Trusted Computer Base Components, Agorics, Inc., Los Altos, CA;7 pages; http://www.cis.upenn.edu/˜KeyKOS/agorics/KeyKos/keysafe/Keysafe.html and http://www.cis.upenn.edu/˜KeyKOS/agorics/KeyKos/keysafe/Trusted.html. |
Van Doorn, Leendert, et al., “Secure Network Objects,” Vrije Universiteit, Amsterdam, The Netherlands, and Digital Systems Research Center, Palo Alto, California USA; 11 pages. |
Dean, Drew, et al., “Java Security: From HotJava to Netscape and Beyond,” Department of Computer Science, Princeton University, Princeton, New Jersey; 11 pages. |
Lampson, Butler W., “Protection” Xerox Corporation, Palo Alto, California; 10 pages. |
Shoffner, Michael, et al., “Java and Web-Executable Object Security—How safe is safe?” Nov. 1996; Java and Web Security, Dr. Dobb's Software Tools for the Professional Programmer; 8 pages; http://www.ddj.com/print/documentID=13332. |
IBM Corp. 1994, “MQSeries Distributed Queue Management Guide.” |
IBM Corp. 1993 “MQSeries Application Programming Guide.” |