Dan M. Nessett

Learn More
In a recent paper [1], Burrows, Abadi and Needham propose a logic for the analysis of authentication protocols. Formulated as a collection of notational constructs acted upon by certain logical postulates, the logic is used to demonstrate several flaws in security protocols 1 described in the literature. A major contribution of their work is the emphasis it(More)
The forty year trend in the computing industry is away from centralized, high unit cost, low unit volume products toward distributed, low unit cost, high unit volume products. The next step in this process is the emergence of massively distributed systems. These systems will penetrate even more deeply into the fabric of society and become the information(More)
We describe ELROS, an embedded language for programming distributed applications using remote operations (ISO 9072-1 and 9072-2). The motivation for this work is the development of both large scale scientific distributed applications as well as ISO application protocol implementations. We compare our work with other systems, such as ISODE and DAS, that(More)
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected communications, present operational or economic difficulties. In other circumstances a Multilayer Firewall can compliment such security technology by providing additional(More)
Recent work examining distributed system security requirements. is critiqued. A notion of trust based on distributed system topology and distributed system node evaluation levels proposed in that work is shown to be deficient. The notion fails to make allowances for the distributed system physical security environment, security factors related to the(More)
Logon in distributed systems can be accomplished in various ways. One technique, known as central authentication, is advantageous with respect to its excellent security properties. Normally, central authentication is provided by either initially designing it into a distributed system or supporting it through the modification of distributed system and host(More)
On February 3-4, 1994, the Internet Society held its first Symposium on Network and Distributed System Security in San Diego, California . The Symposium was a follow-on to the PSRG Workshop held in February, 1993 . Attracting 23 4 participants, the Symposium provided the opportunity for researchers, practitioners and users to hear of new work an d to(More)
Active Networking is a new technology receiving significant attention from the research community. To this point, however, it has not been examined from the perspective of commercial viability. This paper presents an analysis of active networking issues with a view to its possible uses in a commercial environment. It then describes a prototype system built(More)