Previous Contents

References

[1]
M.W. Hicks ``PLAN System Security,'' University of Pennsylvania Technical Report # MS-CIS-98-25, , July 1998.
[2]
J.T. Moore and M.W. Hicks, ``PLAN Programmer's Guide,'' PLAN documentation.
[3]
P. Kakkar and M. Hicks, ``PLAN Tutorial,'' PLAN documentation.
[4]
W. Diffie and M. E. Hellman. ``New Directions in Cryptography.'' IEEE Transactions on Information Theory. vol IT-22, no. 6, pp. 664-654, November 1976.
[5]
``Digital Signature Standard,'' Tech. Rep. FIPS-186, U.S. Department of Commerce, May 1994.
[6]
H. Krawczyk, M. Bellare and R. Canetti, ``HMAC: Keyed-Hashing for Message Authentication.'' IETF RFC 2104, February 1997.
[7]
M. Hicks and A.D. Keromytis, ``A Secure PLAN'' First International Working conference on Active Networks, Springer-Verlag, July 1999.
[8]
Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. ``The Role of Trust Management in Distributed Systems Security.'' In Secure Internet Programming.

Previous Contents