Proxy-based authorization and accounting for distributed systems
暂无分享,去创建一个
[1] Paul A. Karger. Authentication and discretionary access control in computer networks , 1986, Comput. Secur..
[2] Morrie Gasser,et al. An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[4] Jerome H. Saltzer,et al. Section E.2.1 Kerberos Authentication and Authorization System , 1988 .
[5] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[6] Andrew S. Tanenbaum,et al. The Design of a Capability-Based Distributed Operating System , 1986, Comput. J..
[7] Joseph N. Pato,et al. Extending the OSF DCE Authorization System to Support Practical Delegation , 1993 .
[8] Karen R. Sollins,et al. Cascaded authentication , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[9] Roger M. Needham,et al. Grapevine: an exercise in distributed computing , 1982, CACM.