Abstract
When personal machines are incorporated into distributed systems a new mixture of threats is exposed. The security effort in the MobyDick project is aimed at understanding how privacy can be protected in this new environment. Our claim is that a two-step process for authentication and authorisation is required, but also sufficient. The research vehicle is a distributed file repository.
- {1} BLAZE, M., FEIGENBAUM, J., AND LACY, J. Decentralized Trust Management. In IEEE Conference on Security and Privacy (Oakland, CA, May 1996). Google ScholarDigital Library
- {2} BONEH, D., AND LIPTON, R. J. A Revocable Backup System. In 6th USENIX Security Symposium (San Jose, CA, July 1996), pp. 91-96. Google ScholarDigital Library
- {3} GONG, L. A Secure Identity-Based Capability System. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California, May 1989), pp. 56-63.Google Scholar
- {4} LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems 10, 4 (November 1992), 265-310. Google ScholarDigital Library
- {5} LIEBL, A. Authentication in Distributed Systems: A Bibliography. ACM Operating Systems Review 27, 4 (October 1993), 31-41. Google ScholarDigital Library
- {6} RIVEST, R. L., AND LAMPSON, B. SDSI--A Simple Distributed Security Infrastructure. http://theory.lcs.mit.edu/~rivest/- sdsi10.ps, 1996. (Version 1.0).Google Scholar
- {7} TANENBAUM, A. S., VAN RENESSE, R., VAN STAVERN, H., SHARP, G. J., MULLENDER, S. J., JANSEN, J., AND VAN ROSSUM, G. Experience with the Amoeba Distributed Operating System. Communications of the ACM 33, 12 (December 1990), 46-63. Google ScholarDigital Library
- {8} ZIMMERMAN, P. PGP User's Guide, Revised for PGP Version 2.6.1, August 1994.Google Scholar
Index Terms
Security functions for a file repository
Recommendations
A Reuse Repository System: From Specification to Deployment
ICSR '08: Proceedings of the 10th international conference on Software Reuse: High Confidence Software Reuse in Large SystemsA repository is a necessary prerequisite to support software engineers and other users in the process of developing software with and for reuse. In the literature, there are several works that explore reuse repositories, however their focus is mostly on ...
Role and relevance of reuse repository facilitating software development
This paper discusses the role and relevance of reuse repositories and how software reuse influences software development. Reuse repositories are designed to increase the possibility of locating reusable components at a centralized location to ease ...
IoT Security & Privacy: Threats and Challenges
IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and SecurityThe era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent ...
Comments