References
-
[1]
- M.W. Hicks ``PLAN System Security,'' University of
Pennsylvania Technical Report # MS-CIS-98-25,
, July 1998.
- [2]
- J.T. Moore and M.W. Hicks, ``PLAN Programmer's Guide,''
PLAN documentation.
- [3]
- P. Kakkar and M. Hicks, ``PLAN Tutorial,''
PLAN documentation.
- [4]
- W. Diffie and M. E. Hellman. ``New Directions in
Cryptography.'' IEEE Transactions on Information Theory. vol IT-22,
no. 6, pp. 664-654, November 1976.
- [5]
- ``Digital Signature Standard,'' Tech. Rep. FIPS-186,
U.S. Department of Commerce, May 1994.
- [6]
- H. Krawczyk, M. Bellare and R. Canetti, ``HMAC: Keyed-Hashing
for Message Authentication.'' IETF RFC 2104, February 1997.
- [7]
- M. Hicks and A.D. Keromytis, ``A Secure PLAN'' First
International Working conference on Active Networks, Springer-Verlag, July
1999.
- [8]
-
Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. ``The Role of
Trust Management in Distributed Systems Security.'' In Secure Internet
Programming.