[1] Na SH, Park JY, Huh EN. Personal cloud computing security framework. In2010 IEEE Asia-Pacific Services Computing Conference 2010 Dec 6 (pp. 671-675). IEEE.
[2] Abdelmoumin G, Hazzazi N. Distributed Operating System Security and Protection: A Short Survey. In17th International Conference on Information Technology–New Generations (ITNG 2020) 2020 (pp. 145-151). Springer International Publishing.
[3] Wang M, Goscinski A. The development and testing of the identity-based conference key distribution system for the RHODOS distributed system. InComputer Security—ESORICS 92: Second European Symposium on Research in Computer Security Toulouse, France, November 23–25, 1992 Proceedings 2 1992 (pp. 209-228). Springer Berlin Heidelberg.
[4] Priyadarshini SB, Bagjadab AB, Mishra BK. Security in distributed operating system: A comprehensive study. Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies. 2019 Mar 25:221-30.
[5] Dhamdhere D. Operating systems. McGraw-Hill, Inc.; 2008 Jan 9.
[6] Schwarzkopf M, Grosvenor MP, Hand S. New wine in old skins: the case for distributed operating systems in the data center. InProceedings of the 4th Asia-Pacific Workshop on Systems 2013 Jul 29 (pp. 1-7).
[7] Vinter ST, Casey TA, Huber KA. The Secure Distributed Operating System Design Project. BBN LABS INC CAMBRIDGE MA; 1988 Jun 1.
[8] Zhang C, Shaw R, Heckman MR, Benson GD, Archer M, Levitt K, Olsson RA. Towards a Formal Verification of a Secure and Distributed System and Its Applications. CALIFORNIA UNIV DAVIS DEPT OF COMPUTER SCIENCE; 1994 Jan 1.
[9] Caelli WJ. Security in open and distributed systems. Information Management & Computer Security. 1994 Mar 1;2(1):18-24.
[10] Tanenbaum AS, Van Renesse R. Distributed operating systems. ACM Computing Surveys (CSUR). 1985 Dec 10;17(4):419-70.
[11] Arenas AE, Aziz B, Maj S, Matthews B. An autonomic security monitor for distributed operating systems. InTowards a Service-Based Internet: 4th European Conference, ServiceWave 2011, Poznan, Poland, October 26-28, 2011. Proceedings 4 2011 (pp. 112-121). Springer Berlin Heidelberg.
[12] Nessett DM. Identifier protection in a distributed operating system. ACM SIGOPS Operating Systems Review. 1982 Jan 1;16(1):26-31.
[13] Xiao Y, Pan Y, editors. Security in distributed and networking systems. World Scientific; 2007.
[14] Mullender SJ, Van Rossum G, Tananbaum AS, Van Renesse R, Van Staveren H. Amoeba: A distributed operating system for the 1990s. Computer. 1990 May;23(5):44-53.
[15] Chapin PC. Distributed Operating Systems.
[16] Khan S, Waqas SM, Ahmed A. A Survey of Security Threats in Distributed Operating System. i-Manager's Journal on Computer Science. 2020 Sep 1;8(3):44.
[17] Sinha PK. Distributed operating systems: concepts and design. PHI Learning Pvt. Ltd.; 1998.