Abadi, M., Burrows, M., Lampson, B., and Plotkin, G. “A Calculus For Access Control in Distributed Systems,” ACM Trans. Program. Lang. Syst., 15(4), Sep. 1993, pp. 706-734. |
Denning, D. and Sacco, G., Timestamps in Key Distribution Protocols. Com of the ACM, vol. 24, No. 8, Aug. 1981, pp. 533-536. |
Diffie, W.. and Hellman, M. “New Directions in Cryptography,” IEEE Trans. Inf. Theor. IT-22, 6 (Nov. 1976), pp. 644-654. |
Gligor, V., Luan, S., and Pato, J. “On Inter-Realm Authentication in Large Distributed Systems,” Proc. 1992 IEEE Symp. on Research in Security and Privacy, May 1992. |
Gong., L. “Increasing Availability and Security of an Authentication Service,” IEEE J. on Selected Areas in Commun, vol. 11, No. 5, Jun. 1993, pp. 657-662. |
Lamport, L. “Time, Clocks and Ordering of Events in a Disbributed System,” Commun. Ass. Comput. Mach., vol. 21, pp. 558-565, Jul. 1978. |
Nueman, B. Clifford, and Ts'o, Theordore. “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications, vol. 32, No. 9, Sep., 1994. |
Rivest, R., Shamir, A., and Adleman, L. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” Commun. ACM 21, 2 (Feb. 1978), pp. 120-126. |
Sollins, D. “Cascaded Authentication” Proc. 1988 IEEE Symp. on Research in Security and Privacy, Apr. 1988, pp. 156-163. |
Stubblebine, S., and Gligor, V. “Protocol Design for Integrity Protection” Proc. IEEE Symposium on Security and Privacy, Oakland, 1993, pp. 41-53. |
Yahalom, R., Klein, B., Beth T. “Trust-Based Navigation in Distributed Systems,” Computing Systems, vol. 7, No. 1, Winter 1994, pp. 45-73. |
Butler Lampson et al., “Authentication in Distributed Systems: Theory and Practice,” ACM Trans. on Comp. Systs., 10(4): 265-10, Nov. 1992. |
Joseph J. Tardo and Alagappan, K. “SPX: Global Authentication Using Public Key Certificates,” Proc. 14th National Computer Security Conference, NIST/NCSC, Baltimore 1991. |
Stubblebine, S., and Gligor, V. “On Message Integrity in Cryptographic Protocols” Proc. IEEE Symposium on Security and Privacy, Oakland, 1992. |
Neuman, B. Clifford, “Proxy-Based Authorization and Accounting for Distributed Systems,”Proc. 13th Internet Draft, Mar. 95. |
Barbara Liskov, “Practical Uses of Synchronized Clocks in Distributed Systems,” Proc. 10th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Aug., 1991, pp. 1-9. |
Morrie Gasser and Ellen McDermont, “An Architecture for Practical Delegation in a Distributed System,”Proc. IEEE Symp. on Security and Privacy, Oakland, 1990, pp. 20-30. |
Li Gong, “A Security Risk of Depending on Synchronized Clocks,” ACM Operating Syst. Rev., vol. 26, No. 1, pp. 49-53, Jan. 1992. |
Kent, S. “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Managements,” RFC 1422, IAB IRTF PSRG, IET PEM WG, Feb. 1993. |
Gasser, M. et al. “TI: Digital Distributed System Security Architecture,” Proc. 12th National Computer Security Conference, National Institute of Standards and Technology, Baltimore, MD 1989. |
Burrows, J.H. et al., “Digital Signature (DSS).” May 1994, FIPS PUB 186, U.S. Dept. of Commerce Nat'l Institure of Standard and Technology, Gaithersburg, MD., Digital Signature Standard. |
Amber, E. et al., “Data Encryption Standard,” National Bureau of Standards, Jan. 15, 1977 FIPS PUB 46. |
Tung, B. et al., “Public Key Cryptography for Initial Authentication in Kerberos,” Internet RFC 1510, American Bankers Association, Nov. 19, 1994, American National Standard X9.30-199X. |
Herlihy, M.P. et al., “Hybrid Concurrency Control for Abstract Data Types,” J. of Computer and System Sciences, vol. 43, issue 1, Aug. 1991, pp. 25-61. |
Berkovits, S., “Public Key Infrastructure Study: Final Report,”MITRE Corporation Technical Report, Apr. 1994. |