SLIDE 27 AICCSA'03 Autonomic Computing Tutorial, July 2003 79
Bibliography (contd.)
– “A Scalable Content-Addressable Network”, S. Ratnasamy, P. Francis, M. Handley, R. Karp and S. Shenker, In Proceedings of ACM SIGCOMM, 2001 – “Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications”, I. Stoica, R. Morris, D. Karger, F. Kaashoek and H. Balakrishnan, In Proceedings of ACM SIGCOMM, 2001 – “Flexible Information Discovery in Decentralized Distributed Systems”, Cristina Schmidt and Manish Parashar, In Proceedings of IEEE High Performance Distributed Computing, June 2003 – Gnutella webpage: http://gnutella.wego.com/ – Napster webpage: http://napster.com/ – “Universal Description, Discovery and Integration: UDDI”, Technical White paper, September 2000 AICCSA'03 Autonomic Computing Tutorial, July 2003 80
Bibliography (contd.)
– “A Community Authorization Service for Group Collaboration,” L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke, Proceedings of the IEEE 3rd International Workshop
- n Policies for Distributed Systems and Networks, 2002
– “A National-Scale Authentication Infrastructure,” R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, V. Welch. IEEE Computer, 33(12):60-66, 2000 – “A Security Architecture for Computational Grids,” I. Foster, C. Kesselman, G. Tsudik, S.
- Tuecke. Proc. 5th ACM Conference on Computer and Communications Security
Conference, pp. 83-92, 1998 – "BlueBox : A Policy-Driven, Host-Based Intrusion Detection System ", Suresh N. Chari, Pau-Chen Cheng, NDSS'02 – “Certificate-Based Access Control For Widely Distributed Resources,” Mary Thompson, M., W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, A. Essiari. Usenix Security Symposium, 1999 – “Decentralized Trust Management,” M. Blaze, J. Feigenbaum and J. Lacy, IEEE Symposium on Security and Privacy, Oakland, CA. May 1996 AICCSA'03 Autonomic Computing Tutorial, July 2003 81
Bibliography (contd.)
– “Generalized Role-Based Access Control for Securing Future Applications,” Michael J. Covington, M.J.M., Mustaque Ahamad, National Information Systems Security Conference (NISSC), 2000 – “Intrusion detection inter-component adaptive negotiation,” R. Feiertag, S. Rho, L. Benzinger,
- S. Wu, T. Redmond, C. Zhang, K. Levitt, D. Peticolas, M. Heckman, S. Staniford, and J.
McAlerney, Computer Networks, 34:605--621, 2000 – "Intrusion detection with mobile agents", Wayne A. Jansen, ELSEVIER, Computer communications, p. 1392-1401 Volume 25, Issue 15, 2002 – “Negotiating Trust on the Web,” Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Brian Smith and Lina Yu, IEEE Internet Computing, November-December, 2002 – “Role-Based Access Control Models,” Ravi Sandhu, E.C., Hal Feinstein, Charles Youman, IEEE Computer, 1996 – “Role-Based Access Control With X.509 Attribute Certificates,” David W. Chadwick, Alexander Otenko, Edward Ball, Internet computing, pp.62-69, 2003 – “Role Templates for Content-Based Access Control,” Iglio, L.G.a.P, Proceedings of the Second ACM Workshop on Role Based Access Control , Virginia, USA, 1997