Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
1.11 References
“Fortezza Cryptologic Programmers Guide”, Version 1.52, National Security Agency Workstation Security Products, National Security Agency, 30 January 1996.
“BSAFE Library Reference Manual”, Version 4.0, RSA Data Security, 1998.
“Generic Cryptographic Service API (GCS-API)”, Open Group Preliminary Specification, June 1996.
“Microsoft CryptoAPI Application Programmers Guide”, Version 1, Microsoft Corporation, 16 August 1996.
“PKCS #11 Cryptographic Token Interface Standard”, Version 2.10, RSA Laboratories, December 1999.
“Lessons Learned in Implementing and Deploying Crypto Software”, Peter Gutmann, Proceedings of the 11thUsenix Security Symposium, August 2002.
“Generic Security Service Application Programming Interface”, RFC 2078 (formerly RFC 1508), John Linn, January 1997.
“Generic Interface to Security Services”, John Linn, Journal of Computer Communications, Vol.17,No.7 (July 1994), p.483.
“Practical Intranet Security”, Paul Ashley and Mark Vandenwauver, Kluwer Academic Publishers, 1999.
“DCE Security Programming”, Wei Hu, O’Reilly and Associates, July 1995.
“Common Cryptographic Architecture Cryptographic Application Programming Interface”, D. Johnson, G. Dolan, M. Kelly, A. Le, and S. Matyas, IBM Systems Journal, Vol.30,No.2 (1991), p.130.
“SESAME Technology Version 4”, December 1995 (newer versions exist but are no longer publicly available).
“Security Services Application Programming Interface (SS API) Developer’s Security Guidance”, Amgad Fayad and Don Faatz, MITRE Technical Report MTR 99W0000027, MITRE Corporation, March 2000.
“Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API)”, RFC 2479, Carlisle Adams, December 1998.
“Cryptographic APIs”, Dieter Gollman, Cryptography: Policy and Algorithms, Springer-Verlag Lecture Notes in Computer Science, No.1029, July 1995, p.290.
“Architecture for Public-key Infrastructure (APKI), Draft 3”, The Open Group, 27 March 1998.
“CISS: Generalised Security Libraries”, Sead Muftic and Edina Hatunic, Computers and Security, Vol.11,No.7 (November 1992), p.653.
“Security Architecture for Open Distributed Systems”, Sead Muftic, Ahmed Patel, Peter Sanders, and Rafael Colon, John Wiley and Sons, 1993.
“Implementation of the Comprehensive Integrated Security System for computer networks”, Sead Muftic, Computer Networks and ISDN Systems, Vol.25,No.5 (1992), p.469.
“Practical Intranet Security: Overview of the State of the Art and Available Technologies”, Paul Ashley and Mark Vandenwauver, Kluwer Academic Publishing, 1999.
“Common Data Security Architecture (CDSA) Version 2.0”, The Open Group, May 1999.
“A Comparison of CDSA to Cryptoki”, Ruth Taylor, Proceedings of the 22ndNational Information Systems Security Conference (formerly the National Computer Security Conference), October 1999, CDROM distribution.
“Domain Models and Software Architectures”, Rubén Prieto-DÍaz, ACM SIGSOFT Softare Engineering Notes, Vol.20,No.3 (July 1995), p.71.
“Pattern-Oriented Software Architecture: A System of Patterns”, Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, and Michael Stal, John Wiley and Sons, 1996.
“An Introduction to Software Architecture”, David Garlan and Mary Shaw, Advances in Software Engineering and Knowledge Engineering, Vol.1, 1993.
“Proceedings of the First International Workshop on Architectures for Software Systems”, Seattle, Washington, April 1995.
“Design Patterns: Elements of Reusable Object-Oriented Software”, Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, and Grady Booch, Addison-Wesley, 1995.
“Formulations and Formalisms in Software Architecture”, Mary Shaw and David Garlan, Computer Science Today: Recent Trends and Developments, Springer-Verlag Lecture Notes in Computer Science, No.1000, 1996, p.307.
“Succeedings of the Second International Software Architecture Workshop (ISAW-2)”, Alexander Wolf, ACM SIGSOFT Software Engineering Notes, Vol.22,No.1 (January 1997), p.42
“Test and Analysis of Software Architectures”, Will Tracz, Proceedings of the 1996 International Symposium on Software Testing and Analysis (ISSTA’96), ACM, January 1996, p.1.
“Foundations for the Study of Software Architecture”, Dewayne Perry and Alexander Wolf, ACM SIGSOFT Software Engineering Notes, Vol.17,No.4 (October 1992), p.40.
“Essays on Object-Oriented Software Engineering”, Edward Bernard, Simon and Schuster, 1993.
“The Elements of Networking Style and other Essays and Animadversions on the Art of Intercomputer Networking”, Mike Padlipsky, Prentice-Hall, 1985.
“Security Service API: Cryptographic API Recommendation, Updated and Abridged Edition”, NSA Cross Organization CAPI Team, National Security Agency, 25 July 1997.
“Microsoft Cryptographic Application Programming Interface (CryptoAPI)”, Version 2, Microsoft Corporation, 22 December 1998.
“A programmer’s view of the Intel 432 system”, Elliott Organick, McGraw-Hill, 1985.
“An Architecture Supporting Security and Persistent Object Stores”, M. Reitenspieß, Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information (Security and Persistence’ 90), Springer-Verlag, 1990, p.202.
“Rekursiv: Object-Oriented Computer Architecture”, David Harland, Ellis Horwood/Halstead Press, 1988.
“AS/400 Architecture and Application: The Database Machine”, Jill Lawrence, QED Publishing Group, 1993.
“OpenPGP Message Format”, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, RFC 2440, November 1998.
“Building a High-Performance Programmable, Secure Coprocessor”, Sean Smith and Steve Weingart, Computer Networks and ISDN Systems, Vol.31,No.4 (April 1999), p.831.
“SKIPJACK and KEA Algorithm Specification”, Version 2.0, National Security Agency, 29 May 1998.
“Object-Oriented Requirements Analysis and Logical Design: A Software Engineering Approach”, Donald Firesmith, John Wiley and Sons, 1993.
“Problems in Object-Oriented Software Reuse”, David Taenzer, Murhty Ganti, and Sunil Podar, Proceedings of the 1989 European Conference on Object-Oriented Programming (ECOOP’89), Cambridge University Press, July 1989, p.25.
“Virtual Cut-Through: A New Computer Communication Switching Technique”, Parviz Kermani and Leonard Kleinrock, Computer Networks, Vol.3,No.4 (September 1979), p.267.
“A Survey of Wormhole Routing Techniques in Direct Networks”, Lionel Ni and Philip McKinley, IEEE Computer, Vol.26,No.2 (February 1993), p.62.
“Wormhole routing techniques for directly connected multicomputer systems”, Prasant Mohapatra, ACM Computing Surveys, Vol.30,No.3 (September 1998), p.374.
“Design of a Computer: The Control Data 6600”, J.E. Thornton, Scott, Foresman and Co., 1970.
“Paradigms for Process Interation in Distributed Programs”, Gregory Andrews, ACM Computing Surveys Vol.23,No.1 (March 1991), p.49.
“Conducting an Object Reuse Study”, David Wichers, Proceedings of the 13thNational Computer Security Conference, October 1990, p.738.
“The Art of Computer Programming, Vol.1: Fundamental Algorithms”, Donald Knuth, Addison-Wesley, 1998.
“Garbage collection of linked data structures”, Jacques Cohen, ACM Computing Surveys, Vol.13,No.3 (September 1981), p.341.
“Uniprocessor Garbage Collection”, Paul Wilson, Proceedings of the International Workshop on Memory Management (IWMM 92), Springer-Verlag Lecture Notes in Computer Science, No.637, 1992, p.1.
“Reference Counting Can Manage the Circular Environments of Mutual Recursion”, Daniel Friedman and David Wise, Information Processing Letters, Vol.8,No.1 (2 January 1979), p.41.
“Garbage Collection: Algorithms for Automatic Dynamic Memory Management”, Richard Jones and Rafael Lins, John Wiley and Sons, 1996
“Message Sequence Chart (MSC)”, ITU-T Recommendation Z.120, International Telecommunication Union, March 1993.
“The Standardization of Message Sequence Charts”, Jens Grabowski, Peter Graubmann, and Ekkart Rudolph, Proceedings of the IEEE Software Engineering Standards Symposium (SESS’93), September 1993.
“Tutorial on Message Sequence Charts”, Ekkart Rudolph, Peter Graubmann, and Jens Grabowski, Computer Networks and ISDN Systems, Vol.28,No.12 (December 1996), p.1629.
“Integrating an Object-Oriented Data Model with Multilevel Security”, Sushil Jajodia and Boris Kogan, Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1990, p.76.
“Inside Windows 95”, Adrian King, Microsoft Press, 1994.
“Unauthorised Windows 95”, Andrew Schulman, IDG Books, 1994.
“Java Security Architecture”, JDK 1.2, Sun Microsystems Corporation, 1997.
Rights and permissions
Copyright information
© 2004 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
(2004). The Software Architecture. In: Cryptographic Security Architecture. Springer, New York, NY. https://doi.org/10.1007/0-387-21551-4_1
Download citation
DOI: https://doi.org/10.1007/0-387-21551-4_1
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-95387-8
Online ISBN: 978-0-387-21551-8
eBook Packages: Springer Book Archive