Clifford Neuman

Learn More
This document provides an overview and specification of Version 5 of the Kerberos protocol, and updates RFC1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC1510. This document is intended to provide a detailed description of the protocol, suitable for implementation,(More)
THEODORE TS’O leads the Kerberos V5 development effort at the Massachusetts Institute of Technology. odern computer systems provide service to multiple users and require the ability to accurately identify the user making a request. In traditional systems, the user’s identity is verified by checking a password typed during login; the system records the(More)
We present a new model for authorization that integrates both local and distributed access control policies and that is extensible across applications and administrative domains. We introduce a general mechanism that is capable of implementing several security policies including role-based access control, Clark-Wilson, ACLs, capabilities, and lattice-based(More)
The design of security for cyber-physical systems must take into account several characteristics common to such systems. Among these are feedback between the cyber and physical environment, distributed management and control, uncertainty, real-time requirements, and geographic distribution. This paper discusses these characteristics and suggests a design(More)
Cheating in online games comes with many consequences for both players and companies. Therefore, cheating detection and prevention is an important part of developing a commercial online game. Several anti-cheating solutions have been developed by gaming companies. However, most of these companies use cheating detection measures that may involve breaches to(More)
The power grid is a federated system. Regions of the system are controlled by different organizations and security of the grid is imposed from above through regulation of the security techniques used by the federants. This approach will be less effective as we move to a smart grid, where control of some elements of the grid rests in the customer’s home(More)
Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture(More)