• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,335
Next 10 →

Authentication in the Taos Operating System

by Edward Wobber, Martín Abadi, Michael Burrows, Butler Lampson , 1994
"... We describe a design for security in a distributed system and its implementation. In our design, applications gain access to security services through a narrow interface. This interface provides a notion of identity that includes simple principals, groups, roles, and delegations. A new operating sy ..."
Abstract - Cited by 199 (10 self) - Add to MetaCart
We describe a design for security in a distributed system and its implementation. In our design, applications gain access to security services through a narrow interface. This interface provides a notion of identity that includes simple principals, groups, roles, and delegations. A new operating

Practical Byzantine fault tolerance and proactive recovery

by Miguel Castro, Barbara Liskov - ACM Transactions on Computer Systems , 2002
"... Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, B ..."
Abstract - Cited by 410 (7 self) - Add to MetaCart
Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is

Proof-Carrying Authentication

by Andrew W. Appel, Edward W. Felten - In Proceedings of the 6th ACM Conference on Computer and Communications Security , 1999
"... We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks --- including Taos, SPKI, SDSI, and X.509 --- have been explained using logic. We show that by starting with the logic, we can implement these framework ..."
Abstract - Cited by 202 (6 self) - Add to MetaCart
We have designed and implemented a general and powerful distributed authentication framework based on higher-order logic. Authentication frameworks --- including Taos, SPKI, SDSI, and X.509 --- have been explained using logic. We show that by starting with the logic, we can implement

Lightweight remote procedure call

by Brian N. Bershad, Thomas E. Anderson, Edward D. Lazowska, Henry M. Levy - ACM Transactions on Computer Systems , 1990
"... Lightweight Remote Procedure Call (LRPC) is a communication facility designed and optimized for communication between protection domains on the same machine. In contemporary small-kernel operating systems, existing RPC systems incur an unnecessarily high cost when used for the type of communication ..."
Abstract - Cited by 292 (26 self) - Add to MetaCart
-machine communication to nearly the lower bound imposed by conventional hardware. LRPC has been integrated into the Taos operating system of the DEC SRC Firefly multiprocessor workstation.

The Battle Against Phishing: Dynamic Security Skins

by Rachna Dhamija, J. D. Tygar - IN SOUPS ’05: PROCEEDINGS OF THE 2005 SYMPOSIUM ON USABLE PRIVACY AND SECURITY , 2005
"... Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misguide) users. We propose a new scheme, Dynamic Security Skins, that allows a remote web server to prove its identity in a w ..."
Abstract - Cited by 202 (7 self) - Add to MetaCart
and remember one low entropy password, no matter how many servers he wishes to interact with. To authenticate content from an authenticated server, the user only needs to perform one visual matching operation to compare two images. Furthermore, it places a high burden of effort on an attacker to spoof

Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks

by Wei Xu, Sandeep Bhatkar, R. Sekar - In the Proc. of the 15th USENIX Security Symp , 2006
"... Policy-based confinement, employed in SELinux and specification-based intrusion detection systems, is a popular approach for defending against exploitation of vulnerabilities in benign software. Conventional access control policies employed in these approaches are effective in detecting privilege es ..."
Abstract - Cited by 202 (10 self) - Add to MetaCart
Policy-based confinement, employed in SELinux and specification-based intrusion detection systems, is a popular approach for defending against exploitation of vulnerabilities in benign software. Conventional access control policies employed in these approaches are effective in detecting privilege

Design and Implementation of the idemix Anonymous Credential System

by Jan Camenisch, Els Van Herreweghen , 2002
"... Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In this paper, we describe the design ..."
Abstract - Cited by 162 (12 self) - Add to MetaCart
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In this paper, we describe

WebOS: Operating System Services for Wide Area Applications

by Amin Vahdat , Thomas Anderson, Michael Dahlin, Eshwar Belani, David Culler, Paul Eastham , Chad Yoshikawa
"... In this paper, we demonstrate the power of providing a common set of Operating System services to wide-area applications, including mechanisms for naming, persistent storage, remote process execution, resource management, authentication, and security. On a single machine, application developers can ..."
Abstract - Cited by 130 (17 self) - Add to MetaCart
In this paper, we demonstrate the power of providing a common set of Operating System services to wide-area applications, including mechanisms for naming, persistent storage, remote process execution, resource management, authentication, and security. On a single machine, application developers can

On the authentication of RFID systems with bitwise operations

by Basel Alomair, Radha Poovendran - In: Proceedings of the second IFIP conference on new technologies, mobility and security — NTMS’08 , 2008
"... Abstract—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenti-cation via bitwise operations. Following each proposal, a series of papers have been published to point out serious ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenti-cation via bitwise operations. Following each proposal, a series of papers have been published to point out serious

Personal authentication using palm-print features

by Chin-chuan Han, et al. , 2002
"... Biometrics-based authentication is a verification approach using the biological features inherent to each individual. They are processed based on the identical, portable, and arduous duplicate characteristics. In this paper, we propose a scanner-based personal authentication system by using the palm ..."
Abstract - Cited by 72 (0 self) - Add to MetaCart
Biometrics-based authentication is a verification approach using the biological features inherent to each individual. They are processed based on the identical, portable, and arduous duplicate characteristics. In this paper, we propose a scanner-based personal authentication system by using
Next 10 →
Results 1 - 10 of 1,335
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University