APPENDIX II REFERENCES IBM Security Architecture [SC28-8135-01] ECMA 138 (SESAME) (see http://www.esat.kuleuven.ac.be/cosic/sesame3_2.html) Open Systems Foundation Distributed Computing Architectures (see http://www.osf.org/tech_foc.htm) APPENDIX III GLOSSARY
APPENDIX IV PRODUCTS OF INTEREST Secure authentication products A number of clients and servers share a protocol for secure authentication. These include Novell Netware, Windows NT and Oracle Secure Network Services. A choice of these may meet some of the architectural requirements. Single sign-on products Likewise, there are a number of products on the market that meet some or all of the requirements for limited or single sign-on. These include SSO DACS from Mergent International, NetView Access Services from IBM, and NetSP.
Authentication services A number of standard services are available for authenticating evidence of user identity. These include:
Administrative services There are a number of products that are intended for creating and maintaining access control data across a distributed computing environment. These include:
|
We are proud to bring to all of our members a legal copy of this outstanding book. Of course this version is getting a bit old and may not contain all of the info that the latest version are covering, however it is one of the best tool you have to review the basics of security. Investing in the latest version would help you out in your studies and also show your appreciation to Auerbach for letting me use their book on the site.