1 |
T. Tervo, 'Single sign on solutions in a mixed computing environment,' in Proceedings of Helsinki University of Technology, Seminar on Network Security: Authorization and Access Control in Open Network Environment, Chap. 7, 1998
|
2 |
B. C. Neuman and T. Ts'o, 'Kerberos: an authentication service for computer networks,' IEEE Communications Magazine, vol. 32, no. 9, pp. 33 38, Sep., 1994
DOI
ScienceOn
|
3 |
E. Rudolph, P. Graubmann, and J. Grabowski, 'Tutorial on message sequence charts,' Computer Networks and ISDN Systems, vol. 28, no. 12, pp. 16291641, Dec. 1996
DOI
ScienceOn
|
4 |
W. Yeong, T. A. Howes, and S. Kille, Lightweight Directory Access Protocol, RFC 1777, Mar. 1995
|
5 |
OpenLDAP, http://www.openldap.org.
|
6 |
RSA Laboratories, PKCS #1: RSA Cryptography Standard, RSA Laboratories, Sept. 1998, Version 2.0
|
7 |
RSA Laboratories, PKCS #5: Password-Based Cryptography Standard, RSA Laboratories, Mar. 1999, Version 2.0
|
8 |
RSA Laboratories, PKCS #7: Cryptographic Message Syntax Standard, RSA Laboratories, Nov. 1993, Version 1.5
|
9 |
RSA Laboratories, PKCS #8: Private-Key Information Syntax Standard, RSA Laboratories, Nov. 1993, Version 1.2
|
10 |
RSA Laboratories, PKCS #10: Certification Request Syntax Standard, RSA Laboratories, May 2000, Version 1.7
|
11 |
Netscape Communications Corporation, Single Sign-On Deployment Guide: Security, Netscape Communications Corporation, 1997
|
12 |
S. Chokhani, 'Toward a national public key infrastructure,' IEEE Communications Magazine, vol. 32, no. 9, pp. 70 74, Sep. 1994
DOI
ScienceOn
|
13 |
J. Hursti, 'Single sign-on,' in Proceedings of Helsinki University of Technology, Seminar on Network Security: Security of Corporate Net works, Chap. 2, 1997
|
14 |
R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signature and public key cryptosystems,' Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978
DOI
ScienceOn
|
15 |
D. Hogrefe, 'Validation of SDL systems,' Computer Networks and ISDN Systems, vol. 28, no. 12, pp. 1659-1667, Dec. 1996
DOI
ScienceOn
|
16 |
H. P. Konigs, 'Cryptographic identification methods for smart cards in the process of standardization,' IEEE Communications Magazine, vol. 29, no. 6, pp. 42 48, Jun. 1991
DOI
ScienceOn
|
17 |
L. Huovinen, 'Modern encryption methods in user authentication,' in Proceedings of Helsinki Uni versity of Technology, Seminar on Network Security: Security of Corporate Networks, Chap. 4, 1997
|