Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleAugust 2012
An Architectural Approach for Cost Effective Trustworthy Systems
WICSA-ECSA '12: Proceedings of the 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software ArchitecturePages 325–328https://doi.org/10.1109/WICSA-ECSA.212.54We describe a research program on design techniques to enable the cost-effective construction of trustworthy systems. The focus is on single-machine systems that can be formally verified to provide desired system-wide security and safety properties. ...
- research-articleApril 2012
Improving interrupt response time in a verifiable protected microkernel
EuroSys '12: Proceedings of the 7th ACM european conference on Computer SystemsPages 323–336https://doi.org/10.1145/2168836.2168869Many real-time operating systems (RTOSes) offer very small interrupt latencies, in the order of tens or hundreds of cycles. They achieve this by making the RTOS kernel fully preemptible, permitting interrupts at almost any point in execution except for ...
- research-articleJuly 2011
Protected hard real-time: the next frontier
APSys '11: Proceedings of the Second Asia-Pacific Workshop on SystemsArticle No.: 1, Pages 1–5https://doi.org/10.1145/2103799.2103801Hard real-time systems are typically written to execute either on bare metal or on a small real-time executive that offers no memory protection. This model scales poorly as systems become more complex and integrated, as is the trend in industry today. ...
- invited-talkOctober 2010
The road to trustworthy systems
STC '10: Proceedings of the fifth ACM workshop on Scalable trusted computingPages 3–10https://doi.org/10.1145/1867635.1867638Computer systems are routinely deployed in life- and mission-critical situations, yet their security, safety or dependability can in most cases not be assured to the degree warranted by the application. In other words, trusted computer systems are ...
- ArticleAugust 2009
Critical issues in trust management for mobile ad-hoc networks
IRI'09: Proceedings of the 10th IEEE international conference on Information Reuse & IntegrationPages 97–100Mobile Ad-Hoc Networks (MANETs) are adaptive and self-organizing, and as a consequence, securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of ...
- research-articleJanuary 2008
Open trusted health informatics structure (OTHIS)
The potential for development and deployment of trusted health information systems (HIS) based upon intrinsically more secure computer system architectures than those in general use, as commodity level systems, in today's marketplace is investigated in ...
- research-articleSeptember 2005
Implementing Trustworthy Services Using Replicated State Machines
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 3, Issue 5Pages 34–43https://doi.org/10.1109/MSP.2005.125A thread of research has emerged to investigate the interactions of replication with threshold cryptography for use in environments that satisfy weak assumptions. The result is a new paradigm known as distributed trust; this article attempts to survey ...
- discussionSeptember 2005
Homeland Security
IEEE Intelligent Systems (IEEECS-INTELLI-NEW), Volume 20, Issue 5Pages 76–86https://doi.org/10.1109/MIS.2005.89A panel was held at the 2005 AAAI Spring Symposium on AI Technologies and Homeland Security at Stanford University. This issue's essays stem from that panel and aim to facilitate the dialogue between policy makers and information security technology ...
- ArticleJanuary 2005
Agent-based distributed software verification
ACSC '05: Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38Pages 159–164Despite decades of research, the takeup of formal methods for developing provably correct software in industry remains slow. One reason for this is the high cost of proof construction, an activity that, due to the complexity of the required proofs, is ...
- ArticleJanuary 2004
Using self-defending objects to develop security aware applications in Java™
ACSC '04: Proceedings of the 27th Australasian conference on Computer science - Volume 26Pages 341–349The self defending object (SDO) approach to the development of security aware applications represents a change in the object oriented paradigm, whereby the software objects that encapsulate sensitive data or provide security sensitive functionality are ...
- ArticleDecember 1996
SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems
The SIGMA project is researching the integration and interoperation of security technologies into distributed computing environments based on CORBA, the Common Object Request Broker Architecture. The architectural results described in the paper are ...
- ArticleAugust 1995
Administration in a multiple policy/domain environment: the administration and melding of disparate policies
New standards for trusted systems propose multiple security policies and multiple policy domains. My experience building a Mutipolicy Machine prototype illustrated that multiple policy domains and complex policies push current policy administration ...