1 |
Java Embedded Server 2.0, http://wwws.sun.com/software/embeddedserver/index.html
|
2 |
Ericsson's e-box system-An electronic services enabler, http://www.ericsson.com/about/publications/review/1999_01/files/1999015.pdf
|
3 |
128비트 블록 암호화알고리즘(SEED) 개발 및 분석 보고서, http://www.kisa.or.kr/technology/sub1/report.pdf
|
4 |
Java Cryptography Library, J/LOCK, http://www.stitec.com/product/ejlock.html
|
5 |
OSGi Service Platform Release 2 Specification, http://www.osgi.org/resources/docs/spr2book.pdf, October 2001
|
6 |
John Clark, Jeremy Jacob, 'A Survey of Authentication Protocol Literature: Version 1.0,' University of York, Department of Computer Science, November, 1997
|
7 |
Steven M. Bellovin and Michael Merritt, 'Limitations of the kerberos Authentication System,' Proceedings of the Winter 1991 USENIX Conference, Januuary 1991
|
8 |
B.Clifford Neuman and Theodore Ts'o, 'Kerberos : An Authentication Service for Computer network,' IEEE, Computer Magazine, 32:9:33-38, September 1994
DOI
ScienceOn
|
9 |
S. M. Bellovin and M. Merritt, 'Encrypted Key Exchange: Password based protocols secure against dictionary attacks,' Proceedings 1992 IEEE Symposium on Research in Security and Privacy, 72-84, IEEE Computer Society, May 1992
DOI
|
10 |
Marc Branchaud, 'A Survey of Public Key Infrastructures,' Department of Computer Science, McGill University, Montreal, 1997
|
11 |
전경석, 문창주, 박대하, 백두권, 'OSGi Service Framework 환경에서 사용자 인증 방법,' 정보과학회지, 제29권, 제1호, page 865-867, 2002
|
12 |
Mayank Upadhyay and Ram Marti, 'Single Sign-On Using Kerberos in Java,' http://java.sun.com/j2ec/1.4/docs/guide/security/jgss/single-signon.html
|
13 |
ISO/IEC. Information Technology - Security techniques - Entity Authentication Mechanisms part 2: Entity authentication using symmetic techniques, 1993
|
14 |
B. Clifford Neuman and Stuart G. Stubblebine, 'A Note on the Use of Timestamps on Nonces,' Operating System Review, 27(2):10-4, April 1993
DOI
|
15 |
CCITT Recommendation X.509,The Directory-Authentication Framework, December, 1988
|
16 |
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein and Charles E. Youman, 'Role-Based Access Control Models,' IEEE Computer, volume 29, number 2, February19896, page 38-47
DOI
ScienceOn
|
17 |
Charlie Lai and Li Gong, 'User Authentication and Authorization in the Java Platform,' Computer Security Applications Conference, December 1999
DOI
|
18 |
김영갑, 문창주, 박대하, 백두권, 'OSGi 서비스 프레임워크 환경에서의 서비스 번들 인증 메커니즘,' 정보과학회지, 제29권, 제1호, page 868-870, 2002
과학기술학회마을
|
19 |
V. Samar and C. Lai, 'Making Login Services Independent from Authentication Technologies,' Proceedings of the SunSoft Developer's Conference, March 1996
|
20 |
Default Policy Implementation and Policy File Syntax, http://java.sun.com/products/jdk/1.2/docs/guide/security/PolicyFiles.html
|
21 |
Li Gong,'Variations on the Themes of Message Freshness and Replay or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols,' the Computer Security Foundations Workshop VI, 1993
DOI
|
22 |
Fowler, M., UML distilled: Applying the standard object modeling language, Addison Wesley, May, 1997
|