REFERENCES

Team-Fly

  1. J. Postel and J. Reynolds, "Telnet Protocol Specification," Request for Comments 854 (STD 8), May 1983.

  2. B. Kantor, "BSD Rlogin," Request for Comments 1282, December 1991.

  3. D. Borman, "Telnet Authentication: Kerberos Version 4," Request for Comments 1411, January 1993.

  4. K. Alagappan, "Telnet Authentication: SPX," Request for Comments 1412, January 1993.

  5. M. Blaze and S. M. Bellovin, "Session-Layer Encryption," Proceedings of USENIX UNIX Security Symposium, June 1995.

  6. R. L. Rivest and A. Shamir, "How to Expose an Eavesdropper," Communications of the ACM, Vol. 27, No. 4, 1984, pp. 393–395.

  7. D. R. Safford, D. K. Hess, and D. L. Schales, "Secure RPC Authentication (SRA) for TEL-NET and FTP," Proceedings of USENIX UNIX Security Symposium, October 1993, pp. 63–67.

  8. B. A. LaMacchia and A. M. Odlyzko, "Computation of Discrete Logarithms in Prime Fields," Designs, Codes, and Cryptography, Vol. 1, 1991, pp. 46–62.

  9. D. Vincenzetti, S. Taino, and F. Bolognesi, "STEL: Secure Telnet," Proceedings of USENIX UNIX Security Symposium, June 1995.

  10. T. Ylönen, "SSH—Secure Login Connections over the Internet," Proceedings of USENIX UNIX Security Symposium, July 1996.

  11. D. J. Barrett and R. E. Silverman, SSH, the Secure Shell: The Definitive Guide, O'Reilly & Associates, Sebastopol, CA, 2001.

  12. J. Postel and J. Reynolds, "File Transfer Protocol (FTP)," Request for Comments 959 (STD 9), October 1985.

  13. D. H. Crocker, "Standard for ARPA Internet Text Messages," Request for Comments 822 (STD 11), August 1982.

  14. J. Postel, "Simple Mail Transfer Protocol," Request for Comments 821 (part of STD 10), August 1982.

  15. L. Hughes, Internet E-Mail: Protocols, Standards, and Implementations, Artech House, Norwood, MA, 1998.

  16. D. Strom and M. T. Rose, Internet Messaging, Prentice Hall, Upper Saddle River, NJ, 1998.

  17. R. Oppliger, Secure Messaging with PGP and S/MIME, Artech House, Norwood, MA, 2001.

  18. R. Oppliger, Security Technologies for the World Wide Web, Artech House, Norwood, MA, 2000.

  19. J. Franks, et al., "An Extension to HTTP: Digest Access Authentication," Request for Comments 2069, January 1997.

  20. E. Rescorla and A. Schiffman, "The Secure HyperText Transfer Protocol," Request for Comments 2660, August 1999.

  21. G. Bossert, S. Cooper, and W. Drummond, "Considerations for Web Transaction Security," Request for Comments 2084, January 1997.

  22. J. D. Weeks, A. Cain, and B. Sanderson, "CCI-Based Web Security—A Design Using PGP," Proceedings of 4th International World Wide Web Conference, December 1995, pp. 381–395.

  23. D. Eastlake, "Domain Name System Security Extensions," Request for Comments 2535, March 1999.

  24. M. Blaze, "A Cryptographic File System for UNIX," Proceedings of ACM Conference on Computer and Communications Security, November 1993, pp. 9–16.

  25. M. Blaze, "Key Management in an Encrypting File System," Proceedings of USENIX Summer Conference, June 1994, pp. 27–35.

  26. J. H. Howard, "An Overview of the Andrew File System," Proceedings of USENIX Conference, 1988, pp. 23–26.

  27. M. L. Kazar, "Synchronization and Caching Issues in the Andrew File System," Proceedings of USENIX Conference, 1988, pp. 27–36.

  28. P. Honeyman, L. B. Huston, and M. T. Stolarchuk, "Hijacking AFS," Proceedings of USENIX Conference, 1992, pp. 175–182.

  29. R. Oppliger, Authentication Systems for Secure Networks, Artech House, Norwood, MA, 1996.

  30. J. G. Steiner, B. C. Neuman, and J. I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Proceedings of the USENIX UNIX Security Symposium, August 1988.

  31. J. Kohl and B. C. Neuman, "The Kerberos Network Authentication Service," Massachusetts Institute of Technology (MIT), Cambridge, MA, December 1990.

  32. J. I. Schiller, "Secure Distributed Computing," Scientific American, November 1994, pp. 72–76.

  33. G. A. Champine, D. E. Geer, and W. N. Ruh, "Project Athena as a Distributed Computer System," IEEE Computer, Vol. 23, September 1990, pp. 40-50.

  34. G. A. Champine, MIT Project Athena—A Model for Distributed Computing, Digital Press, 1991.

  35. S. P. Miller, et al., "Kerberos Authentication and Authorization System," Section E.2.1 of the Project Athena Technical Plan, Massachusetts Institute of Technology (MIT), Cambridge, MA, December 1987.

  36. S. M. Bellovin, and M. Merritt, "Limitations of the Kerberos Authentication System," ACM Computer Communication Review, Vol. 20, 1990, pp. 119–132.

  37. J. Kohl and B. C. Neuman, "The Kerberos Network Authentication Service (V5)," Request for Comments 1510, September 1993.

  38. B. Tung, Kerberos: A Network Authentication System, Addison-Wesley, Reading, MA, 1999.

  39. R. M. Needham and M. D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, Vol. 21, December 1978, pp. 993–999.

  40. R. M. Needham and M. D. Schroeder, "Authentication Revisited," ACM Operating Systems Review, Vol. 21, 1987, p. 7.

  41. D. E. Denning and G. Sacco, "Timestamps in Key Distribution Protocols," Communications of the ACM, Vol. 24, 1981, pp. 533–536.

  42. J. Linn, "The Kerberos Version 5 GSS-API Mechanism," Request for Comments 1964, June 1996.

  43. J. Linn, "Generic Security Services Application Program Interface, Version 2," Request for Comments 2078, January 1997.

  44. C. Adams, "The Simple Public-Key GSS-API Mechanism," Request for Comments 2025, October 1996.

  45. T. A. Parker, "A Secure European System for Applications in a Multi-Vendor Environment (The SESAME Project)," Proceedings of the 14th National Computer Security Conference, 1991.

  46. P. V. McMahon, "SESAME V2 Public Key and Authorisation Extensions to Kerberos," Proceedings of the Internet Society Symposium on Network and Distributed System Security, February 1995, pp. 114–131.

  47. P. Ashley and M. Vandenwauver, Practical Intranet Security—Overview of the State of the Art and Available Technologies, Kluwer Academic Publishers, Norwell, MA, 1999.

  48. J. H. Saltzer, D. P. Reed, and D. D. Clark, "End-to-End Arguments in System Design," ACM Transactions on Computer Systems, Vol. 2, No. 4, November 1984, pp. 277–288.

  49. S. Bellovin, "Report of the IAB Security Architecture Workshop," Request for Comments 2316, April 1998.


Team-Fly


Internet and Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net