Proactive Recovery in a Byzantine-Fault-Tolerant System
This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors.
IO-Lite: A Unified I/O Buffering and Caching System
Are your systems and network functioning correctly? Can you be sure at this moment? Every administrator has some need to be able to answer these or similar questions on an ongoing basis.
Listen and Whisper: Security Mechanisms for BGP
The Internet is a collection of autonomous systems (AS's), numbering more than 14,000 in a recent count. The inter-domain routing protocol, BGP, knits these autonomous systems together into a coherent whole
Cryptographic Device Support for FreeBSD
FreeBSD recently adopted the OpenBSD Cryptographic Framework [Keromytis et al, 2003]. In doing so it was necessary to convert the core framework to function correctly in a fully-preemptive/multiprocessor operating system environment.
Remote Timing Attacks Are Practical
Timing attacks enable an attacker to extract secrets maintained in a security system by observing the time it takes the system to respond to various queries
Security in Plan 9
The security architecture of the Plan 9(tm) operating system has recently been redesigned to address some technical shortcomings. This redesign provided an opportunity also to make the system more convenient to use securely. Plan 9 has thus improved in two ways not usually seen together: it has become more secure and easier to use.
CPCMS: A Configuration Management System Based on Cryptographic Names
Online Free
The Dos and Don'ts of Client Authentication on the Web
We provide a description of the limitations, requirements, and security models specific to Web client authentication. This includes the introduction of the interrogative adversary, a surprisingly powerful adversary that can adaptively query a Web site.
NT Security in an Open Academic Environment
Stanford Linear Accelerator Center (SLAC) was faced with the need to secure its PeopleSoft/Oracle business system in an academic environment which only has a minimal firewall. To provide protected access to the database servers for NT-based users all over the site while not hindering the lab's open connectivity with the Internet, we implemented a pseudo three-tier architecture for PeopleSoft with Windows Terminal Server and Citrix MetaFrame technology
The Design and Analysis of Graphical Passwords
In this paper we explore an approach to user authentication that generalizes the notion of a textual password and that, in many cases, improves the security of user authentication over that provided by textual passwords.
Fairplay—A Secure Two-Party Computation System - Free eBook Fairplay—A Secure Two-Party Computation System - Download ebook Fairplay—A Secure Two-Party Computation System free
|