Eichin and Rochlis, "With Microscope and Tweezers: An Analysis of the Internet Virus of Nov. 1988", 1989, pp. 326-343. |
J. E. Donnelley et al. "Resource Access Control in a Network Operating System," Univ. of CA, Lawrence Livermore Lab. pp. 115-125. |
R. M. Needham et al. "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, Dec. 1978, vol. 21, No. 12 pp. 993-999. |
D. E. R. Denning "Cryptography and Data Security," (excerpts) '82, pp. 7-16, 56-58, 101-126, 129-133, 161-179, 187-190, 191-329. |
Russel Sandberg et al. "Design and Implementation of the Sun Network Filesystem," USENIX Association Summer Conference Proc. Portland, 1985, Jun. 11-14,1985, pp. 119-130. |
A. S. Tanenbaum "Using Sparse Capabilities in a Distributed Operating System," The 6th Intl. Conf. on Distributed Computing Systems, Cambridge, Mass., May 19-23, 1986, pp. 558-563. |
Richard Stallman "GNU Emacs Manual," Fifth Edition, Emacs Ver. 18, Oct. 1986. |
Xerox, "Authentication Protocol," Xerox System Integration Standard, May 1986. |
James Gosling "SUNDEW: A Distributed and Extensible Window Sys.," USENIX, '86 Winter USNIX TECH. CONF., Colorado pp. 98-103. |
J. G. Steiner "Kerberos: An Authentication Service for Open Network Syst." USENIX Winter Conf. Feb. 9-12, '88, TX, pp. 191-202. |
B.N. Bershad "Watchdogs: Extending the UNIX File System," USENIX Winter Conference Feb. 9-12, 1988, Texas pp. 267-275. |
J.W. Stamos et al. "Remote Evaluation," ACM Trans. on Programming Languages and Systems, vol. 12, No. 4, Oct. 1990 pp. 537-565. |
K. R. Sollins "Cascaded Authentication," Proceedings 1988 IEEE Symposium on Security and Privacy Apr. 18-21, '88, CA pp. 156-163. |
J. H. Howard et al. "Scale and Performance in a Distributed File System," ACM Transactions on Computer Systems, vol. 6, No. 1, Feb. 1988, pp. 51-81. |
M. Satyanarayanan "Integrating Security in a Large Distributed System," ACM Transactions on Computer Systems, vol. 7, No. 3, Aug. 1989, pp. 247-280. |
Morrie Gasser et al. "An Architecture for Practical Delegation in a Distributed System," CH2884-5/90/0000/0020$01.00 .COPYRGT. 1990 IEEE pp. 20-30. |
J. K. Ousterhout "Tel: An Embeddable Command Language," USENIX Association of the Winter 1990 USENIX Conference, Jan. 22-26, 1990, Washington, D.C., USA pp. 133-146. |
SunOS.TM. Reference Manual, Sun Microsystems, (excerpts) Comm. Commands, Misc. Ref. Man. Pages, Chapt. 1, 4, 8 and 14. |