Some issues in security arising from distribution
Part of the Lecture Notes in Computer Science book series (LNCS, volume 563)
Unable to display preview. Download preview PDF.
- ECMA89.ECMA, “Security in Open Systems — Data Elements and Service Definitions,” ECMA-138, European Computer Manufacturers Association, Geneva (Dec 1989).Google Scholar
- CIark87.Clark, David D. and David R. Wilson, “A Comparison of Commercial and Military Computer Security policies,”, pp.184–194, IEEE (April 27–29, 1987).Google Scholar
- Cole90.Cole, Robert, “A Model for Security Standards in Distributed Systems,” Computers & Security 9(4), pp.319–330, Elsevier (June 1990).Google Scholar
- Varadharajan91.Varadharajan, V., P. Allen, and S. Black, “An Analysis of the Proxy Problem in Distributed Systems,” in Proc. IEEE Symposium on Security and Privacy, IEEE, Oakland CA (May 1991).Google Scholar
© Springer-Verlag Berlin Heidelberg 1991