[1] J. P. Anderson, “Information Security in a Multi-user Computer Environment”, Advances in Computers, Vol. 12 (1972): 1–35. (New York: Academic Press, 1973).
[2] L. Lamport, “Password Authentication with Insecure Communications,” Communications of the ACM 24 (1981): 770–771.
[3] B. C. Neuman and T. Ts’o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications 32(9) (1994): 33–38.
[4] M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, “The Digital Distributed System Security Architecture,” Proceedings of the 12th National Security Conference, Baltimore, MD, 1989, pp. 305–319.
[5] OASIS, “Assertions and Protocol for the OASIS Security Assertion Mark-up Language (SAML),” OASIS Standard V1.1 (oasis-sstc-saml-core-1.1), ...
Get Information Assurance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.