Skip to main content
  • 279 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

1.11 References

  1. “Fortezza Cryptologic Programmers Guide”, Version 1.52, National Security Agency Workstation Security Products, National Security Agency, 30 January 1996.

    Google Scholar 

  2. “BSAFE Library Reference Manual”, Version 4.0, RSA Data Security, 1998.

    Google Scholar 

  3. “Generic Cryptographic Service API (GCS-API)”, Open Group Preliminary Specification, June 1996.

    Google Scholar 

  4. “Microsoft CryptoAPI Application Programmers Guide”, Version 1, Microsoft Corporation, 16 August 1996.

    Google Scholar 

  5. “PKCS #11 Cryptographic Token Interface Standard”, Version 2.10, RSA Laboratories, December 1999.

    Google Scholar 

  6. “Lessons Learned in Implementing and Deploying Crypto Software”, Peter Gutmann, Proceedings of the 11thUsenix Security Symposium, August 2002.

    Google Scholar 

  7. “Generic Security Service Application Programming Interface”, RFC 2078 (formerly RFC 1508), John Linn, January 1997.

    Google Scholar 

  8. “Generic Interface to Security Services”, John Linn, Journal of Computer Communications, Vol.17,No.7 (July 1994), p.483.

    Google Scholar 

  9. “Practical Intranet Security”, Paul Ashley and Mark Vandenwauver, Kluwer Academic Publishers, 1999.

    Google Scholar 

  10. “DCE Security Programming”, Wei Hu, O’Reilly and Associates, July 1995.

    Google Scholar 

  11. “Common Cryptographic Architecture Cryptographic Application Programming Interface”, D. Johnson, G. Dolan, M. Kelly, A. Le, and S. Matyas, IBM Systems Journal, Vol.30,No.2 (1991), p.130.

    Google Scholar 

  12. “SESAME Technology Version 4”, December 1995 (newer versions exist but are no longer publicly available).

    Google Scholar 

  13. “Security Services Application Programming Interface (SS API) Developer’s Security Guidance”, Amgad Fayad and Don Faatz, MITRE Technical Report MTR 99W0000027, MITRE Corporation, March 2000.

    Google Scholar 

  14. “Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API)”, RFC 2479, Carlisle Adams, December 1998.

    Google Scholar 

  15. “Cryptographic APIs”, Dieter Gollman, Cryptography: Policy and Algorithms, Springer-Verlag Lecture Notes in Computer Science, No.1029, July 1995, p.290.

    Google Scholar 

  16. “Architecture for Public-key Infrastructure (APKI), Draft 3”, The Open Group, 27 March 1998.

    Google Scholar 

  17. “CISS: Generalised Security Libraries”, Sead Muftic and Edina Hatunic, Computers and Security, Vol.11,No.7 (November 1992), p.653.

    Article  Google Scholar 

  18. “Security Architecture for Open Distributed Systems”, Sead Muftic, Ahmed Patel, Peter Sanders, and Rafael Colon, John Wiley and Sons, 1993.

    Google Scholar 

  19. “Implementation of the Comprehensive Integrated Security System for computer networks”, Sead Muftic, Computer Networks and ISDN Systems, Vol.25,No.5 (1992), p.469.

    Article  Google Scholar 

  20. “Practical Intranet Security: Overview of the State of the Art and Available Technologies”, Paul Ashley and Mark Vandenwauver, Kluwer Academic Publishing, 1999.

    Google Scholar 

  21. “Common Data Security Architecture (CDSA) Version 2.0”, The Open Group, May 1999.

    Google Scholar 

  22. “A Comparison of CDSA to Cryptoki”, Ruth Taylor, Proceedings of the 22ndNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1999, CDROM distribution.

    Google Scholar 

  23. “Domain Models and Software Architectures”, Rubén Prieto-DÍaz, ACM SIGSOFT Softare Engineering Notes, Vol.20,No.3 (July 1995), p.71.

    Google Scholar 

  24. “Pattern-Oriented Software Architecture: A System of Patterns”, Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, and Michael Stal, John Wiley and Sons, 1996.

    Google Scholar 

  25. “An Introduction to Software Architecture”, David Garlan and Mary Shaw, Advances in Software Engineering and Knowledge Engineering, Vol.1, 1993.

    Google Scholar 

  26. “Proceedings of the First International Workshop on Architectures for Software Systems”, Seattle, Washington, April 1995.

    Google Scholar 

  27. “Design Patterns: Elements of Reusable Object-Oriented Software”, Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, and Grady Booch, Addison-Wesley, 1995.

    Google Scholar 

  28. “Formulations and Formalisms in Software Architecture”, Mary Shaw and David Garlan, Computer Science Today: Recent Trends and Developments, Springer-Verlag Lecture Notes in Computer Science, No.1000, 1996, p.307.

    Google Scholar 

  29. “Succeedings of the Second International Software Architecture Workshop (ISAW-2)”, Alexander Wolf, ACM SIGSOFT Software Engineering Notes, Vol.22,No.1 (January 1997), p.42

    Article  Google Scholar 

  30. “Test and Analysis of Software Architectures”, Will Tracz, Proceedings of the 1996 International Symposium on Software Testing and Analysis (ISSTA’96), ACM, January 1996, p.1.

    Google Scholar 

  31. “Foundations for the Study of Software Architecture”, Dewayne Perry and Alexander Wolf, ACM SIGSOFT Software Engineering Notes, Vol.17,No.4 (October 1992), p.40.

    Article  Google Scholar 

  32. “Essays on Object-Oriented Software Engineering”, Edward Bernard, Simon and Schuster, 1993.

    Google Scholar 

  33. “The Elements of Networking Style and other Essays and Animadversions on the Art of Intercomputer Networking”, Mike Padlipsky, Prentice-Hall, 1985.

    Google Scholar 

  34. “Security Service API: Cryptographic API Recommendation, Updated and Abridged Edition”, NSA Cross Organization CAPI Team, National Security Agency, 25 July 1997.

    Google Scholar 

  35. “Microsoft Cryptographic Application Programming Interface (CryptoAPI)”, Version 2, Microsoft Corporation, 22 December 1998.

    Google Scholar 

  36. “A programmer’s view of the Intel 432 system”, Elliott Organick, McGraw-Hill, 1985.

    Google Scholar 

  37. “An Architecture Supporting Security and Persistent Object Stores”, M. Reitenspieß, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information (Security and Persistence’ 90), Springer-Verlag, 1990, p.202.

    Google Scholar 

  38. “Rekursiv: Object-Oriented Computer Architecture”, David Harland, Ellis Horwood/Halstead Press, 1988.

    Google Scholar 

  39. “AS/400 Architecture and Application: The Database Machine”, Jill Lawrence, QED Publishing Group, 1993.

    Google Scholar 

  40. “OpenPGP Message Format”, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, RFC 2440, November 1998.

    Google Scholar 

  41. “Building a High-Performance Programmable, Secure Coprocessor”, Sean Smith and Steve Weingart, Computer Networks and ISDN Systems, Vol.31,No.4 (April 1999), p.831.

    Google Scholar 

  42. “SKIPJACK and KEA Algorithm Specification”, Version 2.0, National Security Agency, 29 May 1998.

    Google Scholar 

  43. “Object-Oriented Requirements Analysis and Logical Design: A Software Engineering Approach”, Donald Firesmith, John Wiley and Sons, 1993.

    Google Scholar 

  44. “Problems in Object-Oriented Software Reuse”, David Taenzer, Murhty Ganti, and Sunil Podar, Proceedings of the 1989 European Conference on Object-Oriented Programming (ECOOP’89), Cambridge University Press, July 1989, p.25.

    Google Scholar 

  45. “Virtual Cut-Through: A New Computer Communication Switching Technique”, Parviz Kermani and Leonard Kleinrock, Computer Networks, Vol.3,No.4 (September 1979), p.267.

    MathSciNet  Google Scholar 

  46. “A Survey of Wormhole Routing Techniques in Direct Networks”, Lionel Ni and Philip McKinley, IEEE Computer, Vol.26,No.2 (February 1993), p.62.

    Google Scholar 

  47. “Wormhole routing techniques for directly connected multicomputer systems”, Prasant Mohapatra, ACM Computing Surveys, Vol.30,No.3 (September 1998), p.374.

    Article  Google Scholar 

  48. “Design of a Computer: The Control Data 6600”, J.E. Thornton, Scott, Foresman and Co., 1970.

    Google Scholar 

  49. “Paradigms for Process Interation in Distributed Programs”, Gregory Andrews, ACM Computing Surveys Vol.23,No.1 (March 1991), p.49.

    Article  Google Scholar 

  50. “Conducting an Object Reuse Study”, David Wichers, Proceedings of the 13thNational Computer Security Conference, October 1990, p.738.

    Google Scholar 

  51. “The Art of Computer Programming, Vol.1: Fundamental Algorithms”, Donald Knuth, Addison-Wesley, 1998.

    Google Scholar 

  52. “Garbage collection of linked data structures”, Jacques Cohen, ACM Computing Surveys, Vol.13,No.3 (September 1981), p.341.

    Article  Google Scholar 

  53. “Uniprocessor Garbage Collection”, Paul Wilson, Proceedings of the International Workshop on Memory Management (IWMM 92), Springer-Verlag Lecture Notes in Computer Science, No.637, 1992, p.1.

    Google Scholar 

  54. “Reference Counting Can Manage the Circular Environments of Mutual Recursion”, Daniel Friedman and David Wise, Information Processing Letters, Vol.8,No.1 (2 January 1979), p.41.

    Article  Google Scholar 

  55. “Garbage Collection: Algorithms for Automatic Dynamic Memory Management”, Richard Jones and Rafael Lins, John Wiley and Sons, 1996

    Google Scholar 

  56. “Message Sequence Chart (MSC)”, ITU-T Recommendation Z.120, International Telecommunication Union, March 1993.

    Google Scholar 

  57. “The Standardization of Message Sequence Charts”, Jens Grabowski, Peter Graubmann, and Ekkart Rudolph, Proceedings of the IEEE Software Engineering Standards Symposium (SESS’93), September 1993.

    Google Scholar 

  58. “Tutorial on Message Sequence Charts”, Ekkart Rudolph, Peter Graubmann, and Jens Grabowski, Computer Networks and ISDN Systems, Vol.28,No.12 (December 1996), p.1629.

    Article  Google Scholar 

  59. “Integrating an Object-Oriented Data Model with Multilevel Security”, Sushil Jajodia and Boris Kogan, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.76.

    Google Scholar 

  60. “Inside Windows 95”, Adrian King, Microsoft Press, 1994.

    Google Scholar 

  61. “Unauthorised Windows 95”, Andrew Schulman, IDG Books, 1994.

    Google Scholar 

  62. “Java Security Architecture”, JDK 1.2, Sun Microsystems Corporation, 1997.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

(2004). The Software Architecture. In: Cryptographic Security Architecture. Springer, New York, NY. https://doi.org/10.1007/0-387-21551-4_1

Download citation

  • DOI: https://doi.org/10.1007/0-387-21551-4_1

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-95387-8

  • Online ISBN: 978-0-387-21551-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics