Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2008
Plan 9 authentication in Linux
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 5Pages 27–33https://doi.org/10.1145/1400097.1400101In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the application is compromised while running as a privileged user, the entire ...
- research-articleApril 2008
Manageable fine-grained information flow
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 4Pages 301–313https://doi.org/10.1145/1357010.1352624The continuing frequency and seriousness of security incidents underline the critical importance of application security. Decentralized information flow control (DIFC), a promising tool for improving application security, gives application developers ...
Also Published in:
Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008: ISBN 9781605580135 - research-articleApril 2008
Application-level isolation and recovery with solitude
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 4Pages 95–107https://doi.org/10.1145/1357010.1352603When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attacker and those made by regular users can be closely intertwined. This problem ...
Also Published in:
Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008: ISBN 9781605580135 - research-articleApril 2008
VPFS: building a virtual private file system with a small trusted computing base
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 4Pages 81–93https://doi.org/10.1145/1357010.1352602In this paper we present the lessons we learned when developing VPFS, a virtual private file system that is based on both a small amount of trusted storage and an untrusted legacy file system residing on the same machine. VPFS' purpose is to provide ...
Also Published in:
Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008: ISBN 9781605580135 - research-articleJanuary 2008
TVDc: managing security in the trusted virtual datacenter
- Stefan Berger,
- Ramón Cáceres,
- Dimitrios Pendarakis,
- Reiner Sailer,
- Enriquillo Valdez,
- Ronald Perez,
- Wayne Schildhauer,
- Deepa Srinivasan
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 1Pages 40–47https://doi.org/10.1145/1341312.1341321Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and applications, in different virtual machines (VMs) on shared physical ...
-
- research-articleJanuary 2008
The Caernarvon secure embedded operating system
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 42, Issue 1Pages 32–39https://doi.org/10.1145/1341312.1341320The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the ...
- articleOctober 2007
Information flow control for standard OS abstractions
- Maxwell Krohn,
- Alexander Yip,
- Micah Brodsky,
- Natan Cliffer,
- M. Frans Kaashoek,
- Eddie Kohler,
- Robert Morris
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 41, Issue 6Pages 321–334https://doi.org/10.1145/1323293.1294293Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to ...
Also Published in:
SOSP '07: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles: ISBN 9781595935915 - articleJuly 2007
Evil twins: two models for TCB reduction in HPC clusters
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 41, Issue 4Pages 20–29https://doi.org/10.1145/1278901.1278906Traditional high performance computing systems require extensive management and suffer from security and configuration problems. This paper presents two generations of a cluster-management system that aims at making clusters as secure and self-managing ...
- articleJuly 2006
Ad hoc extensibility and access control
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 40, Issue 3Pages 93–101https://doi.org/10.1145/1151374.1151393General-purpose, commercial software platforms are increasingly used as system building blocks, even for dependable systems. One reason for their generality, usefulness, and popular adoption is that these software platforms can evolve through ad hoc ...
- articleOctober 2005
Labels and event processes in the asbestos operating system
- Petros Efstathopoulos,
- Maxwell Krohn,
- Steve VanDeBogart,
- Cliff Frey,
- David Ziegler,
- Eddie Kohler,
- David Mazières,
- Frans Kaashoek,
- Robert Morris
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 5Pages 17–30https://doi.org/10.1145/1095809.1095813Asbestos, a new prototype operating system, provides novel labeling and isolation mechanisms that help contain the effects of exploitable software flaws. Applications can express a wide range of policies with Asbestos's kernel-enforced label mechanism, ...
Also Published in:
SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles: ISBN 1595930795 - articleJuly 2005
Enhancement of digital signature with message recovery using self-certified public keys and its variants
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 3Pages 90–96https://doi.org/10.1145/1075395.1075404In 2003, Tseng et al. proposed a self-certified public key signature with message recovery, which gives two advantages: one is that the signer's public key can simultaneously be authenticated in verifying the signature and the other one is that only the ...
- articleJuly 2005
A policy flexible architecture for secure operating system
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 3Pages 24–33https://doi.org/10.1145/1075395.1075397As the fundamental software to guarantee information security, operating system is desired to support various security policies flexibly and to control the propagation and revocation of access rights efficiently. This paper presents a design and ...
- articleApril 2005
Two attacks on a user friendly remote authentication scheme with smart cards
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 2Pages 94–96https://doi.org/10.1145/1055218.1055227Recently, Wu and Chieu proposed a user-friendly remote authentication scheme with smart card. In their scheme, the users can choose and change their passwords freely. However, their scheme is insecure. In this paper, we propose two attacks on their ...
- articleJanuary 2005
Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 90–96https://doi.org/10.1145/1044552.1044562In 2002, Lee, Hwang, and Yang proposed a verifier-free remote user authentication scheme using smart cards. Their scheme is efficient because of mainly using cryptographic hash functions. However, we find that Lee-Hwang-Yang's scheme is not reparable ...
- articleJanuary 2005
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 85–89https://doi.org/10.1145/1044552.1044561In 2000, Peyravian and Zunic proposed an efficient hash-based password authentication scheme that can be easily implemented. Later, Lee, Li, and Hwang demonstrated that Peyravian-Zunic's scheme is vulnerable to an off-line guessing attack, and then ...
- articleJanuary 2005
An efficient authentication protocol for mobile satellite communication systems
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 70–84https://doi.org/10.1145/1044552.1044560Nowadays, wireless communication becomes more and more popular. In 2003, Hwang et al. proposed an authentication scheme for mobile satellite communication systems. However, their proposed scheme lacks efficiency and perfect forward secrecy. Thus, we ...
- articleJanuary 2005
A trust model of p2p system based on confirmation theory
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 56–62https://doi.org/10.1145/1044552.1044558The feature of the peer-to-peer system such as user anonymity, open nature makes that some peers are not responsible for their distributing inauthentic information. An effective solution is that set up the trust model in the p2p system. This paper ...
- articleJanuary 2005
X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 39, Issue 1Pages 4–21https://doi.org/10.1145/1044552.1044553Although Web-based information systems (WISs) have been widely used by enterprises to accomplish business tasks through the Internet, there is little research on designing a flexible access control and delegation model for WISs. In this paper, we design ...
- articleOctober 2004
Remarks on fingerprint-based remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 38, Issue 4Pages 91–96https://doi.org/10.1145/1031154.1031165In 2002, Lee, Ryu, and Yoo proposed a fingerprint-based remote user authentication scheme using smart cards. The scheme makes it possible for authenticating the legitimacy of each login user without any password table. In addition, the authors claimed ...
- articleOctober 2004
A secure one-time password authentication scheme using smart cards without limiting login times
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 38, Issue 4Pages 80–90https://doi.org/10.1145/1031154.1031164With the one-time password concept, the S/Key scheme is widely utilized by the protocols with limited login times to defend against replay attack. By employing the simple and unidirectional hash function, the improved version of the S/Key scheme is ...