- Full text PDF available (5)
- This year (0)
- Last 5 years (0)
- Last 10 years (0)
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected communications, present operational or economic difficulties. In other circumstances a Multilayer Firewall can compliment such security technology by providing additional… (More)
A simple example demonstrates that a significant flaw exist in the Burrows, Abadi and Needham logic. A brief analysis suggests the source of this flaw.
The forty year trend in the computing industry is away from centralized, high unit cost, low unit volume products toward distributed, low unit cost, high unit volume products. The next step in this process is the emergence of massively distributed systems. These systems will penetrate even more deeply into the fabric of society and become the information… (More)
We describe ELROS, an embedded language for programming distributed applications using remote operations (ISO 9072-1 and 9072-2). The motivation for this work is the development of both large scale scientific distributed applications as well as ISO application protocol implementations. We compare our work with other systems, such as ISODE and DAS, that… (More)
Recent work examining distributed system security requirements. is critiqued. A notion of trust based on distributed system topology and distributed system node evaluation levels proposed in that work is shown to be deficient. The notion fails to make allowances for the distributed system physical security environment, security factors related to the… (More)
This RFC suggests a proposed protocol for the Internet community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited.
Donnelley and Fletcher recently presented a scheme to protect capabilities in a distributed operating system.<sup>1</sup> This scheme uses public-key encryption to ensure that capabilities cannot be stolen in a form useful to the thief nor forged by an unauthorized process or user. Unfortunately, security and efficiency considerations make currently… (More)
Active Networking is a new technology receiving significant attention from the research community. To this point, however, it has not been examined from the perspective of commercial viability. This paper presents an analysis of active networking issues with a view to its possible uses in a commercial environment. It then describes a prototype system built… (More)