Pesto flavored security
暂无分享,去创建一个
[1] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[2] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[3] Pradeep K. Khosla,et al. Survivable Information Storage Systems , 2000, Computer.
[4] Mahadev Satyanarayanan,et al. Disconnected Operation in the Coda File System , 1999, Mobidata.
[5] Jon Howell,et al. End-to-end authorization , 2000, OSDI.
[6] Ross J. Anderson,et al. The XenoService { A Distributed Defeat for Distributed Denial of Service , 2000 .
[7] Tage Stabell-Kulø,et al. The Open-End Argument for Private Computing , 1999, HUC.
[8] Maurice Herlihy,et al. How to Make Replicated Data Secure , 1987, CRYPTO.
[9] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[10] Carl M. Ellison,et al. SPKI Requirements , 1999, RFC.
[11] R. Anderson. The Eternity Service , 1996 .
[12] John S. Heidemann,et al. Primarily disconnected operation: experiences with Ficus , 1992, [1992 Proceedings] Second Workshop on the Management of Replicated Data.
[13] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Garret Swart,et al. The Echo Distributed File System , 1996 .
[16] B. Lampson,et al. Protection 1 , 2022 .
[17] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[18] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.