⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http:^^www.cs.utexas.edu^users^lam^nrl^network_security.html

📁 This data set contains WWW-pages collected from computer science departments of various universities
💻 HTML
字号:
MIME-Version: 1.0
Server: CERN/3.0
Date: Tuesday, 07-Jan-97 15:55:05 GMT
Content-Type: text/html
Content-Length: 4987
Last-Modified: Friday, 01-Mar-96 21:21:33 GMT

<title> Network Security</title><H1> Network Security</H1><hr>To enhance the security of networked systems, we proposed a security architecture together with novel protocols for authentication, called Texas Authentication Protocols (TAPs), and a new language for authorization, called Generalized Access Control List (GACL).  A proof methodology for verifying authentication protocols based uponstate transition semantics has been developed.  A high level abstractionfor secure network programming (SNP), designed to resemble a socket interface,has been implemented.<hr><H1> Recent papers </H1>        <ol>        <li> <b> SNP : An interface for secure network programming</b>        <br>        Thomas Y.C. Woo, Raghuram Bindignavle, Shaowen Su and Simon S. Lam        <br>        <cite> Proc. USENIX '94 Summer Technical Conference, </cite>               Boston, June 1994                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/usenix2.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> Design, verification and implementation of an authentication                 protocol </b>        <br>        Thomas Y.C. Woo and Simon S. Lam        <br>        <cite> Proc. Int. Conference on Network Protocols, </cite>               Boston, October 1994                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/icnp94.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> Authorization in distributed systems: A new approach</b>        <br>        Thomas Y.C. Woo and Simon S. Lam        <br>		<cite> Journal of Computer Security, </cite> 1994                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/final-1.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> A lesson in authentication protocol design</b>        <br>        Thomas Y.C. Woo and Simon S. Lam        <br>        <cite> ACM Operating Systems Review, </cite> vol. 28, no. 3, 1994                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/osr.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> A framework for distributed authorization </b>        <br>        Thomas Y.C. Woo and Simon S. Lam        <br>        <cite> Proc. ACM Conference on Computer and Communications Security, </cite>               Fairfax, Virginia, November 1993                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/acm-es.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> Verifying authentication protocols: Methodology and example</b>        <br>	Thomas Y. C. Woo and Simon S. Lam	<br>	<cite> Proc. Int. Conference on Network Protocols,</cite>	       San Francisco, October 1993                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/icnp.ps.Z">                <b>compressed postscript file</b></a>                </ul> 	<li> <b>A semantic model for authentication protocols</b>	<br>	Thomas Y. C. Woo and Simon S. Lam	<br>	<cite> Proc. IEEE Symposium on Research in Security and Privacy,</cite>	       Oakland, May 1993                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/sec93.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> Authorization in distributed systems: A formal approach</b>        <br>        Thomas Y.C. Woo and Simon S. Lam	<br>        <cite> Proc. IEEE Symposium on Research in Security and Privacy, </cite>        	       Oakland, May 1992                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/sec92.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> Applying a theory of modules and interfaces to security verification</b>        <br>        Simon S. Lam, A. Udaya Shankar, and Thomas Y. C. Woo	<br>        <cite> Proc. IEEE Symposium on Research in Security and Privacy, </cite> 	       Oakland, May 1991                <ul>                <li> <a href = "ftp://ftp.cs.utexas.edu/pub/lam/main.ps.Z">                <b>compressed postscript file</b></a>                </ul>        <li> <b> Authentication revisited</b>        <br>        Thomas Y.C. Woo and Simon S. Lam        <br>        <cite> Computer, </cite> vol. 25, no. 3, page 10, March 1992	<br>	(first publication of authentication protocol implemented in SNP)<p>        <li> <b> Authentication for distributed systems </b>        <br>        Thomas Y.C. Woo and Simon S. Lam        <br>        <cite> Computer, </cite> vol. 25, no. 1, pp. 39-52, January 1992                <ul>                <li> <a href = "comp1.html">                <b>more info</b></a>                </ul>        </ol>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -