Cary G. Gray and David R. Cheriton, “Leases: An Efficient Fault-Tolerant Mechanism for Distributed File Cache Consistency”, ACM, 1989, pp. 201-210.* |
Andrew Birrell, Greg Nelson, Susan Owicki, and Edward Wobber, “Network Objects”, ACM, 1993, pp. 217-230.* |
Elliot Kolodner, Barbara Liskov, and William Weihl, “Automatic Garbage Collection: Managing a Stable Heap”, ACM, 1989, pp. 15-25.* |
Cary G. Gray and David R. Cheriton, “Leases; An Efficient Fault-Tolerant Mechanism for Distributed File Cache Consistency”, ACM, 1989, pp. 201-210.* |
“Consumers Can View, Share Picture On-Line as Kodak Picture Network Goes ′Live′,” Business Wire, Aug. 25, 1997, pp. 18-19. |
“ISN Dataweb Sells Software, Hardware,” Datamation, Apr. 1, 1996, p. 40. |
“Kodak DC220 And DC260 Digital Cameras Are Shipping To Retailers Across The Country Cameras Are Optimized for USB Interface Supported in Windows 98,” Business Wire, Jun. 24, 1998, pp. 42-44. |
“Kodak demonstrates leadership across entire photographic category,” M2 Presswire, Feb. 13, 1998, pp. 31-35. |
“Kodak PhotoNet Online Makes It a Snap to Share Summer Photos,” PR Newswire, Jul. 2, 1998, pp. 63-64. |
“Kodak Picture Network Sends Prints Home From the Holidays,” Business Wire, Dec. 29, 1997, pp. 58-60. |
“Photo processing made easy on the Internet; Storm Software and PictureVision team up with Konica Corp.,” Business Wire, Feb. 22, 1996, pp. 3-4. |
“Seeing your photos a whole new way,” Business Wire, Dec. 12, 1996, pp. 9-10. |
“Webwatch: MCI Announces Internet Access,”, Broadwatch Magazine, Jan. 1995. |
Administrator's Guide, Netscape Enterprise Server, Version 3.0, Netscape Communications Corp., 1998. |
Bandrowski, “Stores Without Doors: Kiosks Generate New Profits,” Corporate Computing, Oct. 1992, pp. 193-195. |
Bruno, “Working the Web,” Data Communications, Apr. 1997, pp. 50-60. |
Cohen, “Electronic Commerce,” USC/Information Sciences Institute, Oct. 1989. |
Conhaim, “Online shopping: a beginner's guide; includes related listing of videotex services,” Link-Up, vol. 5, No. 6, p. 32, Nov. 1988. |
Design Project #2, Electronic Shopping at MIT, MIT Class 6.033 Handout 23, Massachusetts Institute of Technology, http://web.mit.edu/6.033/1995/handouts/html/h23.html, Spring 1995, pp. 1-6. |
Ellsworth, “Boom Town,” Internet World, Jun. 1995, pp. 33-35. |
Estrin, “Inter-Organization Networks: Implications of Access Control Requirements for Interconnection Protocols,” ACM, 1986, pp. 254-263. |
Fleischer, “SkyMall's ′Supplier Network′ Takes Flight”, Retailtech, The Technology Magazine for Retail Executives, Apr. 1997. |
Foley, “Managing Campus-Wide Information Systems: Issues and Problems,” Capitalizing on Communication, ACM SIGUCCS XVII, 1989, pp. 169-174. |
Fryxell, “eaasySABRE,” Link-Up, May/Jun. 1996, pp. 10-11. |
Gardner, “Kodak Follows Startup Into Online Photo Processing Business,” Internet World, Sep. 8, 1997, pp. 5-6. |
Gogan et al., “Open Market, Inc.: Managing in a Turbulent Environment,” Harvard Business School Publishing, Aug. 29, 1996, pp. 1-30. |
Israel et al., “Authentication in Office System Internetworks,” ACM Transactions on Office Information Systems, vol. 1, No. 3, Jul. 1983, pp. 193-210. |
Jacob, “The Use of Distributed Objects and Dynamic Interfaces in a Wide-Area Transaction Environment,” SIGCOMMn '95 Workshop on Middleware: Cambridge, Mass., Aug. 1995, pp. 1-3. |
Keller, “Smart Catalogs and Virtual Catalogs,” Proceedings of the First USENIX Workshop of Electronic Commerce, USENIX Association, Jul. 11-12, 1995, pp. 125-131. |
Klein et al., “Trade'ex: The Stock Exchange of the Computer Industry,” Harvard Business School Publishing, 1996, pp. 1-14. |
Kodak Photonet FAQ, PhotoNet Online, Jun. 14, 2002, pp. 1-3. |
Kolodner et al., “Atomic Garbage Collection: Managing a Stable Heap,” ACM, 1989, pp. 15-25. |
Kon, Fabio, “Distributed File Systems Past, Present and Future A distributed File System for 2006,” Mar. 6, 1996, pp. 1-12. |
Kramer, “NETWATCH; The AJC's Daily Online Guide; Get the picture: Kodak will send photos to Web,” The Atlanta Journal and Constitution, Sec. Features, p. 08C, Jun. 5, 1997. |
Lampson et al., “Authentication in Distributed Systems: Theory and Practice,” ACM Transactions n Computer Systems, vol. 10, No. 4, Nov. 1992, pp. 265-310. |
Lansky, “Without APS, Photo Life Goes on Via Internet,” Photgraphic Trade News, Aug. 1996, pp. 19-23. |
Lewis, “Pacific Bell, MCI to Expand Internet Service,” The New York Times, sec. D, col. 1 at 3, Mar. 28, 1995. |
LightSurf Instant Imaging—Press Releases, “Kodak And LightSurf Collaborate On Kodak Picture Center Online,” LifeSurf Technologies Inc., Jun. 14, 2002, pp. 1-3. |
Louwerse et al., “Data Protection Aspects in an Integrated Hospital Information System,” North-Holland Computers & Security 3, 1984, pp. 286-294. |
McEnaney, “Point-and-Click Memory Sharing; Launches PhotoNet online digital photography and imaging services,” Photographic Trade News, Sec. p. 23, Jan. 1997. |
Miller, “Web posting as a photo processing option,” USA Today, Section: Life, p. 17D, Dec. 13, 1996. |
Morris et al., “Andrew: A Distributed Personal Computing Environment,” Communications of the ACM, vol. 29, No. 3, Mar. 1986, pp. 184-201. |
O'Mahony, “Security Considerations in a Network Management Environment,” IEEE Network, May/Jun. 1994, pp. 12-17. |
Oppen et al., “The Clearinghouse: A Decentralized Agent for Locating Names Objects in a Distributed Environment,” ACM Transactions on Office Information Systems, vol. 1, No. 3, Jul. 1983, pp. 230-253. |
Petersen, “New But Not Improved,” Direct Magazine, Nov. 1995. |
Press Release, “Sun Goes Live With The Kodak Picture Network,” Sun Microsystems, Inc., Jun. 14, 2002, pp. 1-2. |
Raeder, “Is there a Prodigy in your future?,” Database Searcher, vol. 5, No. 6, p. 18. |
Ramm et al., “Exu—A System for Secure Delegation of Authority on an Insecure Network,” Ninth System Administration Conference, 1995 LISA IX, Sep. 17-22, 1995, pp. 89-93. |
Satyanarayanan, “Integrated Security in a Large Distributed System,” ACM Transactions on Computer Systems, vol. 7, No. 3, Aug. 1989, pp. 247-280. |
Schroeder et al., “Experience with Grapevine: The Growth of a Distributed System,” ACM Transactions on Computer Systems, vol. 2, No. 1, Feb. 1984, pp. 3-23. |
Senn, “Capitalizing on Electronic Commerce: The Role of the Internet in Electronic Markets,” Information Systems Management, Summer 1996, pp. 15-24. |
Steinke, “Design Aspects of Access Control in a Knowledge Base System,” Computers & Security, 10, 1991, pp. 612-625. |
Stern, “Industry Net,” Link-Up, Mar./Apr. 1995, p. 10. |
Tanenbaum et al., “Distributed Operating Systems,” Computing Surveys, vol. 17, No. 4, Dec. 1985, pp. 419-470. |
The Wall Street Journal, “Barclays Is Opening An ′Electronic Mall′ For Internet Shopping,” Tech. & Health Section at B2, Jun. 1, 1995. |
The Wall Street Journal, “Prodigy Plans to Announce Internet ′Electronic Mail′,” Tech. Section at B5, Nov. 27, 1995. |
Trommer, “Thomas Unveils Online Purchasing Network—Eases Product Sourcing And Ordering Through EDI,” Electronic Buyers' News at 60, Dec. 11, 1995. |
Van Den Berg et al., “Advanced Topics of a Computer Center Audit,” North-Holland Computers & Security 3, 1984, pp. 171-185. |
Van Der Lans, “Data Security in a Relational Database Environment,” North-Holland Computers & Security 5, 1986, pp. 128-134. |
Welz, “New Deals: A ripening Internet market, secure systems and digital currency are reshaping global commerce,” Internet World, Jun. 1995, pp. 36-41. |
Wobber et al., “Authentication in the Taos Operating System,” ACM, 1993, pp. 256-269. |
Wyatt, “Netscape Enterprise Server,” Prima Publishing, 1996. |