Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Implementing remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Grapevine: an exercise in distributed computing
Communications of the ACM
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
ACM Computing Surveys (CSUR) - The MIT Press scientific computation series
ACM Transactions on Computer Systems (TOCS)
VMTP: a transport protocol for the next generation of communication systems
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Managing stored voice in the Etherphone system
ACM Transactions on Computer Systems (TOCS)
Remote pipes and procedures for efficient distributed communication
ACM Transactions on Computer Systems (TOCS)
Exploiting recursion to simplify RPC communication architectures
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
A protocol conversion software toolkit
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
ACM Transactions on Programming Languages and Systems (TOPLAS)
FLIP: an internetwork protocol for supporting distributed systems
ACM Transactions on Computer Systems (TOCS)
Integration of security in network routing protocols
ACM SIGSAC Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Integrating security in inter-domain routing protocols
ACM SIGCOMM Computer Communication Review
Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Separating data and control transfer in distributed operating systems
ASPLOS VI Proceedings of the sixth international conference on Architectural support for programming languages and operating systems
Distributed process groups in the V Kernel
ACM Transactions on Computer Systems (TOCS)
M-RPC: a remote procedure call service for mobile clients
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Reworking the RPC paradigm for mobile clients
Mobile Networks and Applications - Special issue on mobile computing and system services
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Protection in programming-language translations
Secure Internet programming
Secure implementation of channel abstractions
Information and Computation
The Journal of Supercomputing
Protected Object References in Heterogeneous Distributed Systems
IEEE Transactions on Computers
Trust Requirements and Performance of a Fast Subtransport-Level Protocol for Secure Communication
IEEE Transactions on Software Engineering
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
How to Make Replicated Data Secure
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Top-Down Look at a Secure Message
Proceedings of the 19th Conference on Foundations of Software Technology and Theoretical Computer Science
Validating a Web service security abstraction by typing
Proceedings of the 2002 ACM workshop on XML security
CASCON '92 Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research - Volume 2
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
Block-Level Security for Network-Attached Disks
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
SNP: an interface for secure network programming
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Block-level security for network-attached disks
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Hi-index | 0.01 |
Research on encryption-based secure communication protocols has reached a stage where it is feasible to construct end-to-end secure protocols. The design of such a protocol, built as part of a remote procedure call package, is described. The security abstraction presented to users of the package, the authentication mechanisms, and the protocol for encrypting and verifying remote calls are also described.