Sandhu et al, "Non-Monotonic Transformation of Access Rights", Proc. 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 4-6 May 1992, pp. 148-161. |
Bacon et al. "Access Control for a Modular, Extensible Storage Service", PROC. First International Workshop on Services in Distributed and Networked Environments, IEEE Computer Society Press, 27-28 Jun. 1994, pp. 108-114. |
Twiddle et al, "Domain Based Configuration and Name Management for Distributed Systems", Workshop on the Future Trends of Distributed Computing Systems in the 1990s, 14-16 Sep. 1988, pp. 147-153. |
Yu, "Access Control and Authorization Plan for Customer Control of Network Services", Globecom '89:IEEE Global Telecommunications Conf. 27-30 Nov. 89, pp. 862-869 vol. 2. |
Yu, "An Authorization Plan for Commerical Service Systems", PROC of the Sixth Annual Security Applications Conf., 3-7 Dec. 1990, pp. 376-383. |
R. J. Bamford, et al., "Access Control For a Shared Data Base", IBM Technical Disclosure Bulletin, vol. 23 No. 4, Sep. 1990, pp. 1638-1639. |
"Method To Manage Access Control of Multiple Lan Server 1.2 and 1.3 Resources With a Single OS/2 Command", IBM Technical Disclosure Bulletin, vol. 34 No. 11, Apr. 1992, pp. 167-168. |
"Transparent Access To Local or Remote I/O Via Various Channels and/or Links", IBM Technical Disclosure Bulletin, vol. 31 No. 6, Nov. 1988, pp. 220-227. |
"Verification and Access Control in an Object-Oriented System", IBM Technical Disclosure Bulletin, vol. 34 No. 4A, Sep. 1991, pp. 300-302. |
"Handling Local Administrated Media Access Control Addresses in LAN Interconnect", IBM Technical Disclosure Bulletin, vol. 36 No. 04, Apr. 1993 pp. 185-188. |
"Communication Protocol on Virtual Link", IBM Technical Disclosure Bulletin, vol. 28 No. 8, Jan. 1986, pp. 3312-3314. |
M. Ebrahimi, J. Marberg, K. Perry, R. Summers and U. Zernik, "File Name Mapping Method Permitting Network Location Transparency", IBM Technical Disclosure Bulletin, vol. 26 No. 7B, Dec. 1983, pp. 3791-3794. |
Multiprocessing System Memory Access Queue and Scheduling Apparatus, IBM Technical Disclosure Bulletin, vol. 34 No. 12, May 1992, pp. 299-300. |
W.G. Howe, D. P. Karp, R.C. Larson, D.B. McKay and A.J. Shils, "User Node Interface", IBM Technical Disclosure Bulletin, vol. 33 No. 11, Apr. 1991, pp. 2787-2788. |
"Access Authorization For Cache Coherence Control", IBM Technical Disclosure Bulletin, vol. 33 No. 11, Apr. 1991, pp. 306-307. |