[1] J. P. Anderson, “Information Security in a Multi-user Computer Environment”, Advances in Computers, Vol. 12 (1972): 1–35. (New York: Academic Press, 1973).

[2] L. Lamport, “Password Authentication with Insecure Communications,” Communications of the ACM 24 (1981): 770–771.

[3] B. C. Neuman and T. Ts’o, “Kerberos: An Authentication Service for Computer Networks,” IEEE Communications 32(9) (1994): 33–38.

[4] M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, “The Digital Distributed System Security Architecture,” Proceedings of the 12th National Security Conference, Baltimore, MD, 1989, pp. 305–319.

[5] OASIS, “Assertions and Protocol for the OASIS Security Assertion Mark-up Language (SAML),” OASIS Standard V1.1 (oasis-sstc-saml-core-1.1), ...

Get Information Assurance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.