Butler Lampson et al., “Authentication in Distributed Systems: Theory and Practice,” ACM Trans. on Comp. Sys., 10(4): 265-10, Nov. 1992. |
Joseph J. Tardo an Alagappan, K. “SPX: Global Authentication Using Public Key Certificates,” Proc. 14National Computer Security Conference, NIST/NCSC, Baltimore 1991. |
Stubblebine, S. and Gligor, V. “On Message Integrity in Cryptographic Protocols”Proc. IEEE Symposium on Security and Privacy, Oakland, 1992. |
Neuman, B. Clifford, “Proxy-Based Authorization and Accounting for Distributed Systems.” Proc. 13th Internet Draft, Mar. 95. |
Barbara Liskov, “Practical Uses of Synchronized Clocks in Distributed Systems,” Proc. 10th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Aug. 1991, pp. 1-9. |
Morrie Gasser and Ellen McDermott, “An Architecture for Practical Delegation in a Distributed System,” Proc. IEEE Symp. on Security and Privacy, Oakland, 1990, pp. 20-30. |
Li Gong, “A Security Risk of Depending on Synchronized Clocks,” ACM Operating Syst. Rev., vol. 26, No. 1, pp. 49-53, Jan. 1992. |
Kent, S. “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Managements,” RFC 1422, IAB IRTF PSRG, IET PEM WG, Feb. 1993. |
Gasser, M. et al. “TI: Digital Distributed System Security Architecture,” Proc 12th National Computer Security Conference, National Institute of Standards, and Technology, Baltimore, MD 1989. |
Burrows, J.H. et al., “Digital Signature Standard (DSS),” May 1994, FIPS PUB 186, U.S. Dept. of Commerce Nat'l Institute of Standards and Technology, Gaithersburg, MD., Digital Signature Standard. |
Ambler, E. et al., “Data Encryption Standard,” National Bureau of Standards, Jan. 15, 1977 FIPS PUB 46. |
Tung, B. et al., “Public Key Cryptography for Initial Authentication in Kerberos,” Internet RFC 1510, American Bankers Association, Nov. 19, 1994, American National Standard X9.30-199X. |
Herlihy, M.P. et al., “Hybrid Concurrency Control for Abstract Data Types,” J. of Computer and System Sciences, vol. 43, Issue 1, Aug. 1991, pp. 25-61. |
Berkovitz, S., Public Key Infrastructure Study: Final Report, MITRE Corporation Technical Report, Apr. 1994. |
Abadi, M., Burrows, et al., “A Calculus for Access Control in Distributed Systems,” ACM Trans. program. lang. Syst., 15(4), Sep. 1993, pp. 706-734. |
Denning, D., and Sacco, G., Timestamps in Key Distribution Protocols. Com of the ACM, vol. 24, No. 8, Aug. 1981, pp. 533-536. |
Diffie, W. et al., “New Directions in Cryptography,” IEEE Trans. Inf. Theor. IT-22, 6 (Nov. 1976), pp. 644-654. |
Gligor, V., et al., “On Inter-Realm Authentication in Large Distributed Systems,” Proc. 1992 IEEE Symp. on Research in Security and Privacy, May 1992. |
Gong., L. “Increasing Availability and Security of an Authentication Service,” IEEE J. on Selected Areas in Commun, vol. 11, No. 5, Jun. 1993, pp. 657-662. |
Lamport, L. “Time, Clocks and Ordering of Events in a Distributed System,” Commun Ass. Comput. Mach., vol. 21, pp. 558-565, Jul. 1978. |
Neuman, B., et al., Kerberos: An Authentication Service for Computer Networks, IEEE Communications, vol. 32, No. 9, Sep. 1994. |
Rivest, R., et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystem” Commun ACM 21, 2 (Feb. 1978), pp. 120-126. |
Sollins, D., “Cascaded Authentication” proc. 1998 IEEE Symp. on Research in Security and Privacy, Apr. 1988, pp. 156-163. |
Stubblebine, S., et al., “Protocol Design for Integrity Protection” Proc. IEEE Symposium on Security and Privacy, Oakland, 1993, pp. 41-53. |
Yahalom, R. et al., “Trust-Based Navigation in Distributed Systems,” Computing Systems, vol. 7, No. 1, Winter 1994, pp. 45-73. |