[图书][B] Understanding PKI: concepts, standards, and deployment considerations

C Adams, S Lloyd - 2003 - books.google.com
Public-Key Infrastructure (PKI) is the foundation of the four major elements of digital security:
authentication, integrity, confidentiality, and non-repudiation. The idea of a public-key …

[图书][B] Inside Java 2 platform security: architecture, API design, and implementation

L Gong, G Ellison, M Dageforde - 2003 - books.google.com
Inside Java (TM) 2 Platform Security, the definitive and comprehensive guide to the Java
security platform, has been thoroughly updated to reflect key additions and revisions to Java …

[HTML][HTML] Internet small computer systems interface (iSCSI)

J Satran, K Meth, C Sapuntzakis, M Chadalapaka… - 2004 - rfc-editor.org
RFC 3720: Internet Small Computer Systems Interface (iSCSI) [RFC Home] [TEXT|PDF|HTML]
[Tracker] [IPR] [Errata] [Info page] Obsoleted by: 7143 PROPOSED STANDARD Updated by …

Decentralized access control in distributed file systems

S Miltchev, JM Smith, V Prevelakis… - ACM Computing …, 2008 - dl.acm.org
The Internet enables global sharing of data across organizational boundaries. Distributed
file systems facilitate data sharing in the form of remote file access. However, traditional …

RFC 4251: The secure shell (SSH) protocol architecture

T Ylonen - 2006 - dl.acm.org
The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure
network services over an insecure network. This document describes the architecture of the …

Active security support for active networks

Z Liu, RH Campbell… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Active networks aim to provide a software framework that enables network applications to
customize the processing of their communication packets. Security is of critical importance to …

Single sign-on systems-the technologies and the products

TA Parker - 1995 - IET
In simple terms, single sign-on means just what it says: a user of a distributed system who
may potentially be using a variety of different application services spread over different end …

Authenticated key exchange protocols for parallel network file systems

HW Lim, G Yang - IEEE transactions on parallel and distributed …, 2015 - ieeexplore.ieee.org
We study the problem of key establishment for secure many-to-many communications. The
problem is inspired by the proliferation of large-scale distributed file systems supporting …

On the security of key derivation functions

C Adams, G Kramer, S Mister, R Zuccherato - International Conference on …, 2004 - Springer
Key derivation functions are commonly used within many cryptographic schemes in order to
distribute the entropy contained in an uneven way in a long stream of bits into a string that …

[PDF][PDF] GANESHA, a multi-usage with large cache NFSv4 server

P Deniel, T Leibovici, JC Lafoucrière - Linux Symposium, 2007 - landley.net
GANESHA is a user-space NFSv2, NFSv3, and NFSv4 server. It runs on Linux, BSD
variants, and POSIX-compliant UNIXes. It is available under the CeCILL license, which is a …