Kerberos: An authentication service for computer networks BC Neuman, T Ts'o IEEE Communications magazine 32 (9), 33-38, 1994 | 2111 | 1994 |
Kerberos: An Authentication Service for Open Network Systems. JG Steiner, BC Neuman, JI Schiller Usenix Winter, 191-202, 1988 | 1797 | 1988 |
The Kerberos network authentication service (V5) J Kohl, C Neuman RFC 1510, september, 1993 | 1462 | 1993 |
The Kerberos network authentication service (V5) C Neuman, T Yu, S Hartman, K Raeburn RFC 4120, July, 2005 | 710 | 2005 |
Proxy-based authorization and accounting for distributed systems BC Neuman [1993] Proceedings. The 13th International Conference on Distributed …, 1993 | 582 | 1993 |
Kerberos authentication and authorization system SP Miller, BC Neuman, JI Schiller, JH Saltzer In Project Athena Technical Plan, 1988 | 459 | 1988 |
NetCash: A design for practical electronic currency on the Internet G Medvinsky, C Neuman Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 454 | 1993 |
The evolution of the Kerberos authentication service JT Kohl, BC Neuman, TY Ts’o Proceedings of the Spring 1991 EurOpen Conference 199, 1991 | 287 | 1991 |
Requirements for network payment: The netcheque perspective BC Neuman, G Medvinsky Digest of Papers. COMPCON'95. Technologies for the Information Superhighway …, 1995 | 256 | 1995 |
Scale in distributed systems BC Neuman ISI/USC, 1994 | 241 | 1994 |
Experience with deter: a testbed for security research T Benzel, R Braden, D Kim, C Neuman, A Joseph, K Sklower, R Ostrenga, ... 2nd International Conference on Testbeds and Research Infrastructures for …, 2006 | 232 | 2006 |
A note on the use of timestamps as nonces BC Neuman, SG Stubblebine ACM SIGOPS Operating Systems Review 27 (2), 10-14, 1993 | 213 | 1993 |
A comparison of internet resource discovery approaches MF Schwartz, A Emtage, B Kahle, BC Neuman Computing Systems 5 (4), 461-493, 1992 | 195 | 1992 |
The evolution of the Kerberos authentication system JT Kohl, BC Neuman, TY T'so Distributed open systems, 78-94, 1994 | 143 | 1994 |
Adaptive trust negotiation and access control T Ryutov, L Zhou, C Neuman, T Leithead, KE Seamons Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 142 | 2005 |
Section E. 2.1: Kerberos authentication and authorization system SP Miller, BC Neuman, JI Schiller, JH Saltzer MIT Project Athena, Cambridge, Massachusetts (December 21, 1987), 1987 | 123 | 1987 |
The Prospero file system: A global file system based on the virtual system model BC Neuman | 121 | 1992 |
Challenges in security for cyber-physical systems C Neuman DHS workshop on future directions in cyber-physical systems security, 22-24, 2009 | 118 | 2009 |
RFC1510: The Kerberos network authentication service (V5) J Kohl, C Neuman RFC Editor, 1993 | 115 | 1993 |
Integrated access control and intrusion detection for web servers T Ryutov, C Neuman, K Dongho, Z Li IEEE transactions on parallel and distributed systems 14 (9), 841-850, 2003 | 113 | 2003 |