1. Introduction to Ingres Security
VMS Considerations for Kerberos