Security
References
[1]
E. Belani, A. Vahdat, T. Anderson, and M. Dahlin.
CRISIS: A wide area security architecture.
In Seventh USENIX Security Symposium, January 1998.
[2]
Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew
Grimshaw.
A flexible security system for metacomputing environments.
Technical Report CS-98-36, Department of Computer Science, University
of Virginia, Charlottesville, Virginia, December 1998.
[3]
Ian Foster, Carl Kesselman, Gene Tsudik, and Steven Tuecke.
A security architecture for computational grids.
In Fifth ACM Conference on Computers and Communications
Security, November 1998.
[4]
Li Gong, Marianne Mueller, Hemma Prafullchandra, and Roland Schemers.
Going beyond the sandbox: An overview of the new security
architecture in the Java development kit 1.2.
In USENIX Symposium on Internet Technologies and Systems,
pages 103--112, December 1997.
[5]
Andrew S. Grimshaw and William A. Wulf.
Legion: A view from 50,000 feet.
In Fifth IEEE Symposium on High Performance Distributed
Computing, August 1996.
[6]
Andrew S. Grimshaw and William A. Wulf.
The Legion vision of a worldwide virtual computer.
Communications of the ACM, 40(1):39--45, January 1997.
[7]
Mike Lewis and Andrew Grimshaw.
The core Legion object model.
In Fifth IEEE Symposium on High Performance Distributed
Computing, August 1996.
[8]
Object Management Group.
CORBAservices: Common object services specification, security
service specification.
Version 97-12-12, 1998.
[9]
C.L. Viles, M.J. Lewis, A.J. Ferrari, A. Nguyen-Tuong, and A.S.
Grimshaw.
Enabling flexibility in the legion run-time library.
In International Conference on Parallel and Distributed
Processing Techniques and Applications, pages 265--274, June 1997.
[10]
William A. Wulf, Chenxi Wang, and Darrell Kienzle.
A new model of security for distributed systems.
Technical Report CS-95-34, Department of Computer Science, University
of Virginia, Charlottesville, Virginia, August 1995.
|