Mary Thompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith
Jackson,
Proceedings of the Eighth Usenix Security Symposium, Aug. `99
A 12-page paper on the design and implemention of Akenti.
William Johnston, Srilekha Mudumbai, and Mary Thompson,
Proceedings of IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborataive Enterprises - WETICE `98 A six-page paper on the goals and design of the Akenti Distributed Access
Control system.
Srilekha S. Mudumbai, William Johnston, Mary Thompson, Gary Hoo, and
Abdelilah Essiari, Submitted to Fourteenth Annual Computer Security
and Applications Conference `98).
A 23-page paper on the design and implementation of the Akenti Distributed
Access Control system
Gary Hoo, William Johnston, Ian Foster, Alain Roy,
Proceedings of the Eighth InternationalSymposium on High Performance Distributed Computing. Feb `99
Describes a system for advanced reservation of premium
network bandwidth. Akenti provides fine-grained access control to the
system so that only authorized parties may use the enhanced network
service classes.
Srilekha Mudumbai, Abdeliah Essiari, William Johnston, Submited to the Mobile Agents 99 conference Oct.`99
Describes the design of the Anchor mobile agent toolkit including a remote CVS application that could be implemented using mobile agents.
Keith Jackson, Describes the how to use Akenti access control in a secure ORB. Not a
formal paper, but useful as another example of integrating Akenti into
middleware.
The slide presentation that was given at the ESCC workshop on Oct 23, 1998 at Fermi National Lab.Includes screen shots of the Monitor applet and the Use-condition Generator.
A copy of the slide presentation that was given at the DOE2000 Architecture Workshop on Sept. 29-30 and at the Desktop Access to Remote Resources Workshop on Oct. 8-9 at Argonne Nat'l Lab.
The introductory talk for the Third DOE Security Research Workshop. Contains
the motivation for distributed security systems and a review of the current
security threats to on-line systems. (24 slides) (Mar, 1998)
The Akenti Access Control System: Resource Access Control with Authorization
and Attribute Certificates
Overview of the Akenti Access Control system concepts and the environment
in which we are deploying it. Includes abbreviated versions of the following
three walk-throughs of how to use the system. (46 slides) (Jan 1998)
A PDF slide presentation of a walk-through of accessing documents controlled
by a Akenti Web server. Also includes examples of UseCondition and Attribute
certificates. (20 slides) (Jan, 1998)
A PDF slide presentation of a walk-through of the screens you will see
when requesting an Identity certificate from a Netscape Certificate Authority.
(22 slides) (Jan, 1998)
A PDF slide presentation: What a Use-condition is; A walk-through of the
steps to create one and a walk-through of how to get a signing certificate
private key/certificate. (15 slides) (Jan, 1998)
A basic introduction to PKI, including what public/private key pairs are,
how they can be used to ensure confidentiality of documents, integrity
of information and authentication of the author of a document. Also how
Identity Certificates are used to authenticate a person. (25 slides) (Jan,
1998)