Some citations include Universal Resource Locators
(URLs). These URLs have been verified to be correct at the time of
printing. Due to the dynamic nature of the Internet, there are
unfortunately no guarantees for how long an URL will remain
operable. However, as long as a resource remains available
electronically, effort and delays in obtaining a reference can be
greatly reduced. For this reason we have, despite their limited
persistence, decided to include a URL with citations where
an electronic copy or information is available.
Ross Anderson and Bli Biham.
Tiger: A Fast New Hash Function.
In Dieter Gollmann, editor, Fast software encryption: Third
International Workshop, pages 89--97. Springer-Verlag, 1996.
S. Chapin, W. Herndon, L. Notargiacomo, M. Katz, and T. Mowbray.
Security for the Common Object Request Broker Architecture (CORBA).
In Proceedings 10th Annual Computer Security Applications
Conference (Cat. No.94TH8032), pages 21--30. IEEE Comput. Soc. Press, Los
Alamitos, CA, USA, 1994.
ISSN/ISBN 0 8186 6795 8.
G. Cattaneo and G. Persiano.
Design and Implementation of a Transparent Cryptographic File System
for Unix.
Technical report, Dip. Informatica ed Appl., Universta di Salerno,
Baronissi(SA), Italy, 1996.
URL: ftp://edu-gw.dia.unisa.it/pub/tcfs/tcfs.ps.gz.
Silvana Castano and Pierangela Samarati.
An Object-Oriented Security Model for Office Environments.
In Larry D. Sanson, editor, International Carnahan Conference on
Security Technology 26, pages 146--152. IEEE, 1992.
B. den Boer and A. Bosselaers.
Collisions for the compression function of MD5.
In Advances in Cryptology: Eurocrypt '93, pages 293--304.
Springer-Verlag, 1994.
S. A. Demurijian, M.-Y. Hu, T. C. Ting, and D. Kleinman.
Towards an Authorization Mechanism for User-Role Based Security in
an Object-Oriented Design Model.
In Twelfth Annual International Phoenix Conference on Computers
And Communications, pages 195--202, New York, NY, USA, 1993. IEEE.
ISBN 0-7803-0922-7.
ECMA.
Standard ECMA--219, Authentication and Privilege Attribute Security
Application with Related Key Distribution Functions.
114 Rue du Rhône, CH-1204 Geneva, Switzerland, March 1996.
http://www.ecma.ch/stand/ecma-219.HTM.
Mats Gustafsson, Benoit Deligny, and Nahid Shahmehri.
Using NFS to implement Role-Based Access Control.
In Proceedings Sixth IEEE Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises, pages 299--304, MIT,
Cambridge, Massachusetts, USA., June 1997. IEEE Computer Society Press.
ISBN 0-8186-7967-0.
Mats Gustafsson and Nahid Shahmehri.
A Role Description Framework and its Applications to Role-Based
Access Control.
In NORDSEC '96 -- Nordic Workshop on Secure Computer Systems,
Gothenburg, Sweden, Nov 1996. SIG Security/Dept. of Computer Engineering,
Chalmers University of Technology.
Also presented at the IEEE WET ICE '96 Workshop on Enterprise
Security, Stanford University, Palo Alto, June 19--21 1996.
Information technology --- Open Systems Interconnection --- Security
frameworks for open systems: Access control framework.
International standard ISO/IEC 10181-3, Sep 1996.
S. R. Kleiman.
Vnodes: An Architecture for Multiple File Systems Types in Sun
UNIX.
In Proceedings of the Summer 1986 USENIX Conference, pages
238--247, Atlanta, Jun 1986.
Emil C. Lupu, Damian A. Marriott, Morris S. Sloman, and Nicholas Yialelis.
A Policy Based Role Framework for Access Control.
In First ACM Workshop on Role-Based Access Control,
Gaithersburg, Maryland, Nov 1995.
URL ftp://dse.doc.ic.ac.uk/dse-papers/management/rbac95.ps.Z.
Robin Moses.
Computer Security Reference Book, chapter on Risk
Analysis and Management, pages 227--263.
Butterworht-Heinemann, Oxford, 1992.
ISBN 0-7506-0357-7.
National Institute of Standards and Technology (NIST).
Data Encryption Standard (DES).
Federal Information Processing Standards Publication (FIPS PUB) 46-2,
December 1993.
http://csrc.ncsl.nist.gov/fips.
National Institute of Standards and Technology (NIST).
Secure Hash Standard.
Federal Information Processing Standards Publication (FIPS PUB)
180-1, April 1995.
http://csrc.ncsl.nist.gov/fips.
Matunda Nyanchama and Sylvia Osborn.
Access Rights Administration in Role-Based Security Systems.
In J. Biskup, M. Morgenstern, and C. E. Landwehr, editors,
Database security, VIII, pages 37--56. IFIP, North-Holland, 1994.
Novell, Inc.
IntranetWare NFS Services—IntranetWare and NetWare 4 Edition:
Executive Summary.
World Wide Web document.
http://www.novell.com/catalog/qr/sne34210.html.
B. Clifford Neuman and Theodore Ts'o.
Kerberos: An Authentication Service for Computer Networks.
IEEE Communications Magazine, 32(9):33--38, September 1994.
http://nii.isi.edu/publications/kerberos-neuman-tso.html.
Birgit Pfitzmann.
Digital Signature Schemes -- General Framework and Fail-Stop
Signatures.
Lecture Notes in Computer Science 1100. Springer-Verlag, 1996.
ISBN 3-540-61517-2.
Brian Pawlowski, Chet Juszczak, Peter Staubach, Carl Smith, Diane Lebel, and
David Hitz.
NFS Version 3 Design and Implementation.
In Proceedings Summer 1994 USENIX Conference, pages 137--151,
Boston, MA, USA, 1994.
Tom Parker and Chris Sundt.
Role Based Access Control in Real Systems.
In First ACM Workshop on Role-Based Access Control,
Gaithersburg, Maryland, Nov 1995.
Karin Rappe.
Roles and Role Management in Role-Based Access Control -- Model,
design and implementation.
Master's thesis, Linköping University, Dept. of Computer and
Information Science, Linköping University, S-581 83 Linköping,
Sweden, Jan 1997.
LiTH-IDA-Ex-9652.
P. Rogaway and D. Coppersmith.
A Software-Optimized Encryption Algorithm.
In First Workshop on Fast Software Encryption, pages 56--63,
Cambridge, UK, 1993. Springer-Verlag.
Ronald L. Rivest.
The MD4 Message Digest Algorithm.
In Advances in Cryptology --- CRYPTO '90, pages 303--311.
Springer-Verlag, 1991.
Also Internet RFC 1320, April 1992.
R. L. Rivest, A. Shamir, and L. M. Adleman.
A method for obtaining digital signatures and public-key
cryptosystems.
Communications of the ACM, 21(2):120--126, February
1978.
Arto Salomaa.
Public-Key Cryptography, volume 23 of EATCS Monographs
on Theoretical Computer Science.
Springer-Verlag, 1996.
Second enl. edition. ISBN 3-540-61356-0.
Mark Shand, Donald Becker, Rick Sladkey, Orest Zborowski, Fred van Kempen, and
Olaf Kirch.
The LINUX User-Space NFS Server(1), Version 2.2.
URL
ftp://ftp.mathematik.th-darmstadt.de [2]/pub/linux/okir/, December
1995.
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman.
Role-Based Access Control: A Multi-Dimensional View.
In Proceedings of the 10th Annual Computer Security
Applications Conference, Orlando, Florida, Dec 5--9 1994.
URL http://www.list.gmu.edu/confrnc/acsac/ps_ver/a94rabca.ps.
Ravi S. Sandhu and Hal Feinstein.
A Three Tier Architecure for Role-Based Access Control.
In Proceedings of the 17th NIST-NCSC National Computer
Security Conference, pages 138--149, Baltimore, MD, October 11-14 1994.
URL http://www.list.gmu.edu/confrnc/ncsc/ps_ver/b94rbac.ps.
Morris Sloman.
Policy driven management for distributed systems.
Journal of Network and Systems Management, 2(4), 1994.
URL ftp://dse.doc.ic.ac.uk/dse-papers/management/pdman.ps.Z.