1M Burrows ,M Abadi ,R Needham. A Logic of Authentication[J].ACM Transactions in Computer Systems, 1990; 8 ( 1 ): 18~36.
2L Gong,P Syverson. Fail-Stop Protocols:An Approach to Designing Secure Protocols[C].In:Proceedings of DCCA-5 Fifth International Working Conference on Dependable Computing for Critical Applications,Oakland:IEEE Computer Society Press, 1998:79~100.
3Adrian Perrig,Dawn Song. A First Step on Automatic Generation[C].In:Proceedings of Network and Distributed System Security 2000,2000-02.
4Adrian Perrig,Dawn Song. Looking for Diamonds in the Desert-Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols[C].In:Proceedings of the 13Th Computer Security Foundations Workshop,IEEE Computer Society,2000.
5John A Clark,Jeremy L Jacob. Protocols are Programs Too:the Metaheuristic Search for Security Protocols[J].Information and Software Technology, 2001; 43: 891 ~904.
6John A Clark,Jeremy L Jacob. Searching for a Solution:Engineering Tradeoffs and the Evolution of Provably Security Protocols[C].In:Proceedings 2000 IEEE Symposium on Research in Security and Privacy,IEEE Computer Society,2000:82~95.
7Anilkumar Pochiraju.Securing Networked Storage using Defense in Depth.GIAC Security Essentials Certification,2003:3~6
8Azagury A,Canetti R,Factor M et al.A two layered approach for securing an object store network[C].In:Proceedings of the Security in Storage Workshop,First International IEEE,2002-12:10~23
9Yongdae Kim,Maino F,Narasimha M et al. Secure group services for storage area networks[C].In:Proceedings of the Security in Storage Workshop, First International IEEE,2002-12: 80~93
10Brian Pawlowski,Spencer Shepler,Carl Beame et al.The NFS Version 4 Protocol[S].www.nluug.nl/events/sane2000/papers/