Internet & Intranet Security
-
J. Postel and J. Reynolds, "Telnet Protocol Specification," Request for Comments 854 (STD 8), May 1983.
-
B. Kantor, "BSD Rlogin," Request for Comments 1282, December 1991.
-
D. Borman, "Telnet Authentication: Kerberos Version 4," Request for Comments 1411, January 1993.
-
K. Alagappan, "Telnet Authentication: SPX," Request for Comments 1412, January 1993.
-
M. Blaze and S. M. Bellovin, "Session-Layer Encryption," Proceedings of USENIX UNIX Security Symposium, June 1995.
-
R. L. Rivest and A. Shamir, "How to Expose an Eavesdropper," Communications of the ACM, Vol. 27, No. 4, 1984, pp. 393–395.
-
D. R. Safford, D. K. Hess, and D. L. Schales, "Secure RPC Authentication (SRA) for TEL-NET and FTP," Proceedings of USENIX UNIX Security Symposium, October 1993, pp. 63–67.
-
B. A. LaMacchia and A. M. Odlyzko, "Computation of Discrete Logarithms in Prime Fields," Designs, Codes, and Cryptography, Vol. 1, 1991, pp. 46–62.
-
D. Vincenzetti, S. Taino, and F. Bolognesi, "STEL: Secure Telnet," Proceedings of USENIX UNIX Security Symposium, June 1995.
-
T. Ylönen, "SSH—Secure Login Connections over the Internet," Proceedings of USENIX UNIX Security Symposium, July 1996.
-
D. J. Barrett and R. E. Silverman, SSH, the Secure Shell: The Definitive Guide, O'Reilly & Associates, Sebastopol, CA, 2001.
-
J. Postel and J. Reynolds, "File Transfer Protocol (FTP)," Request for Comments 959 (STD 9), October 1985.
-
D. H. Crocker, "Standard for ARPA Internet Text Messages," Request for Comments 822 (STD 11), August 1982.
-
J. Postel, "Simple Mail Transfer Protocol," Request for Comments 821 (part of STD 10), August 1982.
-
L. Hughes, Internet E-Mail: Protocols, Standards, and Implementations, Artech House, Norwood, MA, 1998.
-
D. Strom and M. T. Rose, Internet Messaging, Prentice Hall, Upper Saddle River, NJ, 1998.
-
R. Oppliger, Secure Messaging with PGP and S/MIME, Artech House, Norwood, MA, 2001.
-
R. Oppliger, Security Technologies for the World Wide Web, Artech House, Norwood, MA, 2000.
-
J. Franks, et al., "An Extension to HTTP: Digest Access Authentication," Request for Comments 2069, January 1997.
-
E. Rescorla and A. Schiffman, "The Secure HyperText Transfer Protocol," Request for Comments 2660, August 1999.
-
G. Bossert, S. Cooper, and W. Drummond, "Considerations for Web Transaction Security," Request for Comments 2084, January 1997.
-
J. D. Weeks, A. Cain, and B. Sanderson, "CCI-Based Web Security—A Design Using PGP," Proceedings of 4th International World Wide Web Conference, December 1995, pp. 381–395.
-
D. Eastlake, "Domain Name System Security Extensions," Request for Comments 2535, March 1999.
-
M. Blaze, "A Cryptographic File System for UNIX," Proceedings of ACM Conference on Computer and Communications Security, November 1993, pp. 9–16.
-
M. Blaze, "Key Management in an Encrypting File System," Proceedings of USENIX Summer Conference, June 1994, pp. 27–35.
-
J. H. Howard, "An Overview of the Andrew File System," Proceedings of USENIX Conference, 1988, pp. 23–26.
-
M. L. Kazar, "Synchronization and Caching Issues in the Andrew File System," Proceedings of USENIX Conference, 1988, pp. 27–36.
-
P. Honeyman, L. B. Huston, and M. T. Stolarchuk, "Hijacking AFS," Proceedings of USENIX Conference, 1992, pp. 175–182.
-
R. Oppliger, Authentication Systems for Secure Networks, Artech House, Norwood, MA, 1996.
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Proceedings of the USENIX UNIX Security Symposium, August 1988.
-
J. Kohl and B. C. Neuman, "The Kerberos Network Authentication Service," Massachusetts Institute of Technology (MIT), Cambridge, MA, December 1990.
-
J. I. Schiller, "Secure Distributed Computing," Scientific American, November 1994, pp. 72–76.
-
G. A. Champine, D. E. Geer, and W. N. Ruh, "Project Athena as a Distributed Computer System," IEEE Computer, Vol. 23, September 1990, pp. 40-50.
-
G. A. Champine, MIT Project Athena—A Model for Distributed Computing, Digital Press, 1991.
-
S. P. Miller, et al., "Kerberos Authentication and Authorization System," Section E.2.1 of the Project Athena Technical Plan, Massachusetts Institute of Technology (MIT), Cambridge, MA, December 1987.
-
S. M. Bellovin, and M. Merritt, "Limitations of the Kerberos Authentication System," ACM Computer Communication Review, Vol. 20, 1990, pp. 119–132.
-
J. Kohl and B. C. Neuman, "The Kerberos Network Authentication Service (V5)," Request for Comments 1510, September 1993.
-
B. Tung, Kerberos: A Network Authentication System, Addison-Wesley, Reading, MA, 1999.
-
R. M. Needham and M. D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, Vol. 21, December 1978, pp. 993–999.
-
R. M. Needham and M. D. Schroeder, "Authentication Revisited," ACM Operating Systems Review, Vol. 21, 1987, p. 7.
-
D. E. Denning and G. Sacco, "Timestamps in Key Distribution Protocols," Communications of the ACM, Vol. 24, 1981, pp. 533–536.
-
J. Linn, "The Kerberos Version 5 GSS-API Mechanism," Request for Comments 1964, June 1996.
-
J. Linn, "Generic Security Services Application Program Interface, Version 2," Request for Comments 2078, January 1997.
-
C. Adams, "The Simple Public-Key GSS-API Mechanism," Request for Comments 2025, October 1996.
-
T. A. Parker, "A Secure European System for Applications in a Multi-Vendor Environment (The SESAME Project)," Proceedings of the 14th National Computer Security Conference, 1991.
-
P. V. McMahon, "SESAME V2 Public Key and Authorisation Extensions to Kerberos," Proceedings of the Internet Society Symposium on Network and Distributed System Security, February 1995, pp. 114–131.
-
P. Ashley and M. Vandenwauver, Practical Intranet Security—Overview of the State of the Art and Available Technologies, Kluwer Academic Publishers, Norwell, MA, 1999.
-
J. H. Saltzer, D. P. Reed, and D. D. Clark, "End-to-End Arguments in System Design," ACM Transactions on Computer Systems, Vol. 2, No. 4, November 1984, pp. 277–288.
-
S. Bellovin, "Report of the IAB Security Architecture Workshop," Request for Comments 2316, April 1998.
| Team-Fly |