skip to main content
Bibliometrics
Skip Abstract Section
Abstract

The protocol described in this document is designed to provide access to directories supporting the X.500 models, while not incurring the resource requirements of the X.500 Directory Access Protocol (DAP). This protocol is specifically targeted at management applications and browser applications that provide read/write interactive access to directories. When used with a directory supporting the X.500 protocols, it is intended to be a complement to the X.500 DAP.

RFC Downloads

Cited By

  1. Arauz J (2014). CAP limits in telecom subscriber database design, Proceedings of the VLDB Endowment, 7:13, (1474-1483), Online publication date: 1-Aug-2014.
  2. Pala M and Smith S AutoPKI Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (154-169)
  3. ACM
    Duarte A, Nyczyk P, Retico A and Vicinanza D Global grid monitoring Proceedings of the 2007 workshop on Grid monitoring, (9-16)
  4. ACM
    Aiftimiei C, Andreozzi S, Cuscela G, Donvito G, Dudhalkar V, Fantinel S, Fattibene E, Maggi G, Misurelli G and Pierro A Recent evolutions of GridICE Proceedings of the 2007 workshop on Grid monitoring, (1-8)
  5. ACM
    Bär H, Häussge G and Rößling G (2007). An integrated system for interaction support in lectures, ACM SIGCSE Bulletin, 39:3, (281-285), Online publication date: 25-Jun-2007.
  6. ACM
    Bär H, Häussge G and Rößling G An integrated system for interaction support in lectures Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (281-285)
  7. Tang C, Yao S, Cui Z and Mao L A network security policy model and its realization mechanism Proceedings of the Second SKLOIS conference on Information Security and Cryptology, (168-181)
  8. Ambrosi E, Ghiselli A and Taffoni G GDSE Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (53-57)
  9. Thibaut M and Mertens W Herding cats Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19, (9-9)
  10. Robinson J, Gemmill J, Joshi P, Bangalore P, Chen Y, Peechakara S, Zhou S and Achutharao P Web-Enabled Grid Authentication in a Non-Kerberos Environment Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, (318-322)
  11. Varrette S, Georget S, Montagnat J, Roch J and Leprevost F Distributed authentication in GRID5000 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems, (314-326)
  12. Schwotzer T and Cebulla A Replication of published subject indicator as thesaurus by means of LDAP Proceedings of the First international conference on Charting the Topic Maps Research and Applications Landscape, (69-76)
  13. RA D, Ali S, Gupta I, Dave H, Upadhyay A, Alves L, Damodaran A, Chakrabarti A and Ghosh A Scalable Enterprise Level Workflow Manager for the Grid Proceedings of the Fifth International Conference on Quality Software, (341-348)
  14. Den Heuvel W, Leune K and Papazoglou M (2005). EFSOC, Distributed and Parallel Databases, 18:2, (115-145), Online publication date: 1-Sep-2005.
  15. Gilaberte R and Herrero L IP addresses configuration in spontaneous networks Proceedings of the 9th WSEAS International Conference on Computers, (1-6)
  16. Cohen N, Castro P and Misra A Descriptive naming of context data providers Proceedings of the 5th international conference on Modeling and Using Context, (112-125)
  17. Xu W, Chadwick D and Otenko S Development of a flexible PERMIS authorisation module for shibboleth and apache server Proceedings of the Second European conference on Public Key Infrastructure, (162-179)
  18. Chadwick D Operational models for reputation servers Proceedings of the Third international conference on Trust Management, (108-115)
  19. Lee J, Park B, Choo H and Chung T Policy based handoff in MIPv6 networks Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (468-477)
  20. Gabrijelčič D, Blaič B and Tasič J (2005). Future active Ip networks security architecture, Computer Communications, 28:6, (688-701), Online publication date: 1-Apr-2005.
  21. ACM
    Ahmedi L Making XPath reach for the web-wide links Proceedings of the 2005 ACM symposium on Applied computing, (1714-1721)
  22. ACM
    Leune K, Papazoglou M and van den Heuvel W Specification and querying of security constraints in the EFSOC framework Proceedings of the 2nd international conference on Service oriented computing, (125-133)
  23. ACM
    Andreozzi S, Ciuffoletti A and Ghiselli A Monitoring the connectivity of a grid Proceedings of the 2nd workshop on Middleware for grid computing, (47-51)
  24. Koutsonikola V and Vakali A (2004). LDAP, IEEE Internet Computing, 8:5, (66-72), Online publication date: 1-Sep-2004.
  25. Herault C, Lecomte S and Delot T New technical services using the component model for applications in heterogeneous environment Proceedings of the 4th international conference on Innovative Internet Community Systems, (99-110)
  26. Amer-Yahia S, Srivastava D and Suciu D (2004). Distributed Evaluation of Network Directory Queries, IEEE Transactions on Knowledge and Data Engineering, 16:4, (474-486), Online publication date: 1-Apr-2004.
  27. ACM
    Vailaya A, Bluvas P, Kincaid R, Kuchinsky A, Creech M and Adler A An architecture for biological information extraction and representation Proceedings of the 2004 ACM symposium on Applied computing, (103-110)
  28. Chervenak A, Deelman E, Kesselman C, Allcock B, Foster I, Nefedova V, Lee J, Sim A, Shoshani A, Drach B, Williams D and Middleton D (2003). High-performance remote access to climate simulation data, Parallel Computing, 29:10, (1335-1356), Online publication date: 1-Oct-2003.
  29. ACM
    Deshpande A, Nath S, Gibbons P and Seshan S Cache-and-query for wide area sensor databases Proceedings of the 2003 ACM SIGMOD international conference on Management of data, (503-514)
  30. Vincze S How secure personal mobility can be? Proceedings of the 2003 international conference on Computational science and its applications: PartI, (238-244)
  31. ACM
    Chadwick D (2003). Deficiencies in LDAP when used to support PKI, Communications of the ACM, 46:3, (99-104), Online publication date: 1-Mar-2003.
  32. Rana O and Walker D Service design patterns for computational grids Patterns and skeletons for parallel and distributed computing, (237-264)
  33. ACM
    Ueno Y A bottom-up combinable name service for Peer-to-Peer network Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (98-99)
  34. Braumandl R, Keidl M, Kemper A, Kossmann D, Kreutz A, Seltzsam S and Stocker K (2001). ObjectGlobe: Ubiquitous query processing on the Internet, The VLDB Journal — The International Journal on Very Large Data Bases, 10:1, (48-71), Online publication date: 1-Aug-2001.
  35. Richard G (2000). Service Advertisement and Discovery, IEEE Internet Computing, 4:5, (18-26), Online publication date: 1-Sep-2000.
  36. Yener B Light Weight Security for Parallel Access to Multiple Mirror Sites Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
  37. ACM
    Adjie-Winoto W, Schwartz E, Balakrishnan H and Lilley J (1999). The design and implementation of an intentional naming system, ACM SIGOPS Operating Systems Review, 33:5, (186-201), Online publication date: 12-Dec-1999.
  38. ACM
    Adjie-Winoto W, Schwartz E, Balakrishnan H and Lilley J The design and implementation of an intentional naming system Proceedings of the seventeenth ACM symposium on Operating systems principles, (186-201)
  39. Roussopoulos M, Maniatis P, Swierk E, Lai K, Appenzeller G and Baker M Person-level routing in the mobile people architecture Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (15-15)
  40. Guttman E (1999). Service Location Protocol, IEEE Internet Computing, 3:4, (71-80), Online publication date: 1-Jul-1999.
  41. Hooda A, Karmouch A and Abu-Hakima S (1999). Managing Mobility of Users in a Virtual Network, Multimedia Tools and Applications, 9:1, (43-68), Online publication date: 1-Jul-1999.
  42. ACM
    Jagadish H, Lakshmanan L, Milo T, Srivastava D and Vista D Querying network directories Proceedings of the 1999 ACM SIGMOD international conference on Management of data, (133-144)
  43. ACM
    Jagadish H, Lakshmanan L, Milo T, Srivastava D and Vista D (1999). Querying network directories, ACM SIGMOD Record, 28:2, (133-144), Online publication date: 1-Jun-1999.
  44. ACM
    Cluet S, Kapitskaia O and Srivastava D Using LDAP directory caches Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (273-284)
Contributors
  • University of Michigan, Ann Arbor

Recommendations