D. Williams and H. Lutfiyya
[1] A. Shamir, How to share a secret, Communications of theACM, 22(11), November 1979, 612–613. doi:10.1145/359168.359176 [2] L. Gong, Increasing availability and security of an authentication service, IEEE Journal on Selected Areas in Communications, 11(5), June 1993, 657–662. doi:10.1109/49.223866 [3] R.M. Needham & M.D. Schroeder, Using encryption for authentication in large networks of computers, Communicationsof the ACM, 21(12), December 1978, 993–999. doi:10.1145/359657.359659 [4] M. Reiter & K. Birman, How to securely replicate services, ACM Trans. on Programming Languages and Systems, 15(3), May 1994, 986–1009. doi:10.1145/177492.177745 [5] M.K. Reiter, A security architecture for fault-tolerant systems,PhD thesis, Cornell University, Ithaca, NY, July 1993. [6] M. Reiter, K. Birman & R. van Renesse, A security architecture for fault-tolerant systems, Technical Report TR-93-1354,Cornell University, Ithaca, NY, June 1993. [7] Y. Desmedt & Y. Frankel, Shared generation of authenticators and signatures, in J. Feigenbaum (Ed.), Advances inCryptology—CRYPTO ’91 Proc., Notes in Computer Science576, Springer-Verlag, Berlin, 1992, 313–317. [8] Y. Frankel & Y.G. Desmedt, Parallel reliable thresholdmultisignature, Technical Report TR-92-04-02, University ofWisconson-Milwaukee, Milwaukee, WI, April 1992. [9] R.L. Rivest, A. Shamir, & L. Adleman, A method for obtainingdigital signatures and public-key cryptosystems, Communications of the ACM, 21(2), February 1978, 120–126. doi:10.1145/359340.359342 [10] M.K. Reiter, M.K. Franklin, J.B. Lacy, & R.N. Wright, Theomega key management service, ACM Conf. on Computer andCommunications Security, New Delhi, India, 1996, 38–47. [11] M.K. Reiter, The rampart toolkit for building high-integrityservices, Theory and Practice in Distributed Systems, Vol. 938,Springer-Verlag, Berlin, Germany, 1995, 99–110. [12] L. Chen, D. Gollmann, & C. Mitchell, Key distribution withoutindividual trusted authentication servers, Proc. 8th IEEEComputer Security Foundations Workshop, County Kerry,Ireland, June, 1995, 30–36. [13] C.E. Shannon, Communication theory of secrecy systems, BellSystems Technical Journal, 28(4), October 1949, 656–715. [14] S. Goldberg, Probability: An Introduction, Dover Publications,Inc., New York, 1986. [15] W. Weaver, Lady Luck: The theory of probability, DoverPublications, Inc., New York, 1963. [16] L. Zhou, F. Schneider, & R. van Renesse, Coca: A securedistributed on-line certification authority, ACM Trans. onComputer Systems, 20, 2002, 329–368. doi:10.1145/571637.571638 [17] U. Manber, Introduction to Algorithms: A Creative Approach,Addison-Wesley Publishing Company, Reading, 1989.113 [18] B. Blakley, Security requirements for DCE, Technical ReportDCE RFC-8.1, Open Software Foundation, October 1995. [19] W. Rosenberry, D. Kenney, & G. Fischer (Eds.), UnderstandingDCE, O’Reilly & Associates, Inc., Sebastopol, 1993. [20] W. Hu, DCE Security Programming, O’Reilly & Associates,Sebastopol, 1995. [21] J. Shirley, W. Hu, & D. Magid, Guide to Writing DCEApplications, O’Reilly & Associates, Sebastopol, 1994. [22] C. Smith, Kerberos Authentication in Sun RPC. Available atciteseer.ist.psu.edu/smith93kerberos.html, August 9, 1993. [23] S. Mullan, DCE interoperability with kerberos—functionalspecification, Technical Report DCE RFC-92.0, Open SoftwareFoundation, January 1996. [24] Sun Microsystems, Inc., Mountain View, Network InterfacesProgrammer’s Guide, November 1993. [25] Sun Microsystems, Inc., Mountain View, SunOS 5.3 Administering NFS, October 1993. [26] P.V. McMahon, SESAME public key and authorisation ex-tensions to kerberos, Proc. 1995 Symp. on Network and Dis-tributed System Security (SNDSS’95), San Diego, USA, July1994, 114–131. [27] P. Kaijser, T. Parker, & D. Pinkas, Sesame: The solution tosecurity for open distributed systems, Computer Communica-tions, 17(7), 1994, 501–518. doi:10.1016/0140-3664(94)90105-8 [28] T.A. Parker, A secure European system for applications in amulti-vendor environment (the SESAME project), InformationSecurity: An Integrated Approach (London, UK: Chapman &Hall, Ltd., 1993), 139–156. [29] The Microsoft Corporation, Microsoft Windows NT Dis-tributed Security Services, Technical report, The MicrosoftCorporation, Redmond Washington, November 1996. [30] J.T. Kohl & B.C. Neuman, The kerberos network authentication service (V5), IETF RFC-1510, Network Working Group,September 1993. [31] S.P. Miller, B.C. Neuman, J.I. Schiller, & J.H. Saltzer, Kerberos authentication and authorization system, Project AthenaTechnical Plan, Massachusetts Institute of Technology, Cambridge, 1988. [32] W. Stallings, Network and internetwork security principles andpractice, Prentice-Hall, Inc., Englewood Cliffs, 1995. [33] J.T. Kohl, B.C. Neuman, & T.Y. Ts’o, The evolution of thekerberos authentication service, Project Athena, MassachusettsInstitute of Technology, Cambridge, 1991. [34] MIT, Kerberos V5 Installation Guide, 1.0 edition, November1997. [35] MIT, Kerberos V5 Administrator’s Guide, b7-1 edition,September 1996. [36] D. Williams, Fault-tolerant authentication services, Ph.D. thesis, University of Western Ontario, London, Ontario, April1999.
Important Links:
Go Back