"Proxies, Application Interfaces, and Distributed Systems", Dave et al, IEEE, 1992, pp. 212-220. |
"A Model for Multilevel Security in Computer Networks", Lu et al, IEEE, 1990, pp. 647-659. |
"Correspondence", Chang et al, IEEE, Jul. 1992, p. 372. |
S. P. Miller et al., "Kerberos Authentication and Authorization System," 21 Dec. 1987 Project Athena Technical Plan, pub. by Mass. Inst. of Technology. |
Jennifer G. Steiner et al. "Kerberos: An Authentication service of Open Network Systems," Mar. 30, 1988. |
Morrie Gasser et al., "The Digital Distributed System Security Architecture," Proc. of 1989 Natl. Comp. Security Conf. |