Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/304851.304860acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free access

A new model of security for distributed systems

Published: 17 September 1996 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    Andrew. S. Grimshaw, William A. Wulf, James C. French, Alfred C.Weaver and Paul E Reynolds Jr. "Legion: The Next Logical Step Toward a Nationwide Virtual Computer", June 8, 1994. UVA CS Technical Report CS-94-21
    [2]
    Andrew. S. Grimshaw, "Easy to use object-oriented paraUel programming with Mentat", IEEE computer, pp 39- 51, May 1993
    [3]
    Andrew S. Grimshaw, J. B. Weissman, and W. T. Strayer, "Portable Run-Time Support for Dynamic Object-Oriented Parallel Processing,", submitted to A CM Transactions on Computer,~vstems, July 1993
    [4]
    Andrew S. Grimshaw, E. A. West, and W. R. Pearson, "No Pain and Gain! - Experiences with Mentat on Biological Application," Concurrency: Practice & Experience, pp. 309-328, vol. 5, issue 4, June 1993
    [5]
    Andrew S. Grimshaw, W. T. Strayer, and P. Narayan, "Dynamic OBject-Oriented Parallel Processing" IEEE Parallel & Distributed Technology: Systems & Applications, pp. 33-47, May, 1993
    [6]
    William A. Wulf, Roy Levin, Samuel P. Harbison, "HYDRA/C.mmp: An Experimental Computer System ", McGraw-Hill, New York, 1981
    [7]
    B.W. Lampson, "Protection", Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, pp 437-443. March 1971
    [8]
    H.H. Hosmer, "The Multipolicy Paradigm for Trusted Systems" Proceedings of New Securi~. Paradigms Workshop, pp. 19-32, 1992-1993
    [9]
    B.C. Neuman, T. Y. Ts'o, "Kerberos: An Authentication Service for Computer Networks" IEEE Communications, Vol. 32, pp. 33-38, Sept. 1994
    [10]
    B. Fairthorne, "OMG White Paper on Security", OMG Securi~ Working Group, April 1994
    [11]
    Bruce Schneier, "Applied Cryptography", John Wiley & Sons, INc. 1994
    [12]
    Dorothy E. Denning, "A Lattice Model of Secure Information Flow", Communications of the A CM, Vol 19, No 5, pp 236-242, May 1976,
    [13]
    I.H. Saltzer, "Protection and the Control of Information Sharing in Multics", Communications of the ACM, Vol 17, No 7, pp 388-402, July 1974
    [14]
    I, Snyder, "Formal Models of Capability-based Protection Systems"IEEE Transactions on Computers, vC-30 n3, March 1981, pp 172-181
    [15]
    William R. Cheswick and Steven M. Bellovin, "Firewalls and Internet Security" Addison- Wesley, 1994
    [16]
    C. Landwehr, "Verifying Security", Computing Surveys, Vol. 13, No. 3, Sept. 1981
    [17]
    G. Bcnson, Appelbe, I. Akyildiz, '.The Hierarchical Model of Distributed System Security", IEEE, May 1988, pp 122-128
    [18]
    J.I. Glasgow, G. H. MacEwen, "The Development and Proof of a Formal Specification for a Multilevel Secure System",ACM Transactions on Computer Systems, Vol. 5, No :2, May 1987, pp 151-184
    [19]
    R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-key cryptosysterns", Communications of ACM, vol. 21, no. 2 Feb. 1978, pp. 120-126
    [20]
    Mark Lomas, Bruce Christianson, "To whom am I Speaking", Computer, January 1995
    [21]
    Tom Parker and Denis Pinkas, "SESAME Technology Version 3, Overview," http://www.esat.kuleuven.ac.belcosic/sesame/doc-txff overview.txt, May 1995
    [22]
    Chenxi Wang, Wm A. Wulf, "A Distributed Key Generation Technique". UVA CS Technical Report, CS-96-08.

    Cited By

    View all
    • (2023)Trust and Performance in Future AI-Enabled, Open, Multi-Vendor Network Management AutomationIEEE Transactions on Network and Service Management10.1109/TNSM.2022.321429620:2(995-1007)Online publication date: Jun-2023
    • (2012)Research on cloud computing data security model based on multi-dimension2012 International Symposium on Information Technologies in Medicine and Education10.1109/ITiME.2012.6291448(897-900)Online publication date: Aug-2012
    • (2004)Building a distributed security defence system2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)10.1109/ICSMC.2004.1401167(4064-4071)Online publication date: 2004
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    NSPW '96: Proceedings of the 1996 workshop on New security paradigms
    September 1996
    153 pages
    ISBN:0897919440
    DOI:10.1145/304851
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 September 1996

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    NSPW96
    Sponsor:
    NSPW96: New Security Paradigms Workshop V
    September 17 - 20, 1996
    California, Lake Arrowhead, USA

    Acceptance Rates

    Overall Acceptance Rate 62 of 170 submissions, 36%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)152
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 09 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Trust and Performance in Future AI-Enabled, Open, Multi-Vendor Network Management AutomationIEEE Transactions on Network and Service Management10.1109/TNSM.2022.321429620:2(995-1007)Online publication date: Jun-2023
    • (2012)Research on cloud computing data security model based on multi-dimension2012 International Symposium on Information Technologies in Medicine and Education10.1109/ITiME.2012.6291448(897-900)Online publication date: Aug-2012
    • (2004)Building a distributed security defence system2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583)10.1109/ICSMC.2004.1401167(4064-4071)Online publication date: 2004
    • (2004)Static vs. dynamic recovery models for survivable distributed systems37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the10.1109/HICSS.2004.1265183(9 pp.)Online publication date: 2004
    • (2001)Tools for information security assurance argumentsProceedings DARPA Information Survivability Conference and Exposition II. DISCEX'0110.1109/DISCEX.2001.932223(287-296)Online publication date: 2001
    • (1999)Embedding security policies into a distributed computing environmentACM SIGOPS Operating Systems Review10.1145/311094.31110533:2(51-64)Online publication date: 1-Apr-1999
    • (1998)Meta objects for access controlProceedings of the 1998 workshop on New security paradigms10.1145/310889.310906(30-38)Online publication date: 1-Jan-1998
    • (1998)Meta objects for access controlProceedings of the 1997 workshop on New security paradigms10.1145/283699.283735(17-22)Online publication date: 1-Jan-1998
    • (1998)A practical approach to security assessmentProceedings of the 1997 workshop on New security paradigms10.1145/283699.283731(5-16)Online publication date: 1-Jan-1998
    • (1998)The DGSA: unmet information security challenges for operating system designersACM SIGOPS Operating Systems Review10.1145/280559.28056232:1(3-22)Online publication date: 1-Jan-1998
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media