Some issues in security arising from distribution

  • Robert Cole
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 563)


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. ECMA89.
    ECMA, “Security in Open Systems — Data Elements and Service Definitions,” ECMA-138, European Computer Manufacturers Association, Geneva (Dec 1989).Google Scholar
  2. CIark87.
    Clark, David D. and David R. Wilson, “A Comparison of Commercial and Military Computer Security policies,”, pp.184–194, IEEE (April 27–29, 1987).Google Scholar
  3. Cole90.
    Cole, Robert, “A Model for Security Standards in Distributed Systems,” Computers & Security 9(4), pp.319–330, Elsevier (June 1990).Google Scholar
  4. Varadharajan91.
    Varadharajan, V., P. Allen, and S. Black, “An Analysis of the Proxy Problem in Distributed Systems,” in Proc. IEEE Symposium on Security and Privacy, IEEE, Oakland CA (May 1991).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • Robert Cole
    • 1
  1. 1.Hewlett-Packard LaboratoriesUSA

Personalised recommendations