메뉴 건너뛰기




Volumn 12, Issue 4, 1994, Pages 340-371

A Security Architecture for Fault-Tolerant Systems

Author keywords

key distribution; multicast; process groups

Indexed keywords


EID: 84976763336     PISSN: 07342071     EISSN: 15577333     Source Type: Journal    
DOI: 10.1145/195792.195823     Document Type: Article
Times cited : (25)

References (51)
  • 2
    • 0000874415 scopus 로고
    • Limitations of the Kerberos authentication system
    • (Oct.)
    • BELLOVIN, S. M., AND MERRITT, M. 1990. Limitations of the Kerberos authentication system. Comput. Commun. Rev. 20, 5 (Oct.), 119-132.
    • (1990) Comput. Commun. Rev. , vol.20 , Issue.5 , pp. 119-132
    • BELLOVIN, S.M.1    MERRITT, M.2
  • 5
    • 0023287946 scopus 로고
    • Reliable communication in the presence of failures
    • b, (Feb.)
    • BIRMAN, K. P., AND JOSEPH, T. A. 1987b. Reliable communication in the presence of failures. ACM Trans. Comput. Syst. 5, 1 (Feb.), 44-76.
    • (1987) ACM Trans. Comput. Syst. , vol.5 , Issue.1 , pp. 44-76
    • BIRMAN, K.P.1    JOSEPH, T.A.2
  • 6
    • 84976814834 scopus 로고
    • Lightweight causal and atomic group multicast
    • (Aug.)
    • BIRMAN, K. P., SCHIPER, A., AND STEPHENSON, P. 1991. Lightweight causal and atomic group multicast. ACM Trans. Comput. Syst. 9, 3 (Aug.), 272-314.
    • (1991) ACM Trans. Comput. Syst. , vol.9 , Issue.3 , pp. 272-314
    • BIRMAN, K.P.1    SCHIPER, A.2    STEPHENSON, P.3
  • 7
    • 0011917214 scopus 로고
    • International Telegraph and Telephone Consultative Committee, Geneva, Switzerland.
    • CCITT. 1988. The directory-authentication framework, Recommendation X.509. International Telegraph and Telephone Consultative Committee, Geneva, Switzerland.
    • (1988) The directory-authentication framework, Recommendation X.509
  • 8
    • 0022067076 scopus 로고
    • Distributed process groups in the V kernel
    • (May)
    • CHERITON, D. R., AND ZWAENEPOEL, W. 1985. Distributed process groups in the V kernel. ACM Trans. Comput. Syst. 3, 2 (May), 77-107.
    • (1985) ACM Trans. Comput. Syst. , vol.3 , Issue.2 , pp. 77-107
    • CHERITON, D.R.1    ZWAENEPOEL, W.2
  • 9
    • 0024946716 scopus 로고
    • Probabilistic clock synchronization
    • CRISTIAN, F. 1989. Probabilistic clock synchronization. Distrib. Comput. 3, 3, 146-158.
    • (1989) Distrib. Comput. , vol.3 , Issue.3 , pp. 146-158
    • CRISTIAN, F.1
  • 10
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • (Aug.)
    • DENNING, D. E., AND SACCO, G. M. 1981. Timestamps in key distribution protocols. Commun. ACM 24, 8 (Aug.), 533-536.
    • (1981) Commun. ACM , vol.24 , Issue.8 , pp. 533-536
    • DENNING, D.E.1    SACCO, G.M.2
  • 12
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • J. Feigenbaum, Ed. Lecture Notes in Computer Science, Springer-Verlag, New York
    • DESMEDT, Y., AND FRANKEL, Y. 1992. Shared generation of authenticators and signatures. In Advances in Cryptology-CRYPTO '91 Proceedings, J. Feigenbaum, Ed. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, 457-469.
    • (1992) Advances in Cryptology-CRYPTO '91 Proceedings , vol.576 , pp. 457-469
    • DESMEDT, Y.1    FRANKEL, Y.2
  • 13
    • 0018443381 scopus 로고
    • Privacy and authentication: An introduction to cryptography
    • (Mar.)
    • DIFFIE, W., AND HELLMAN, M. E. 1979. Privacy and authentication: An introduction to cryptography. Proc. IEEE 67, 3 (Mar.), 397-427.
    • (1979) Proc. IEEE , vol.67 , Issue.3 , pp. 397-427
    • DIFFIE, W.1    HELLMAN, M.E.2
  • 14
    • 67650674871 scopus 로고
    • Secure management of SNMP networks
    • Elsevier Science Publishers B.V. (North-Holland), Amsterdam
    • GALVIN, J. M., MCCLOGHRIE, K., AND DAVIN, J. R. 1991. Secure management of SNMP networks. In Integrated Network Management. Vol. 2. Elsevier Science Publishers B.V. (North-Holland), Amsterdam.
    • (1991) Integrated Network Management , vol.2
    • GALVIN, J.M.1    MCCLOGHRIE, K.2    DAVIN, J.R.3
  • 15
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • 11, 5, (June)
    • GONG, L. 1993. Increasing availability and security of an authentication service. IEEE J. Sel. Areas Commun. 11, 5, (June), 657-662.
    • (1993) IEEE J. Sel. Areas Commun. , pp. 657-662
    • GONG, L.1
  • 16
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • (Jan.)
    • GONG, L. 1992. A security risk of depending on synchronized clocks. ACM Oper. Syst. Rev. 26, 1 (Jan.), 49-53.
    • (1992) ACM Oper. Syst. Rev. , vol.26 , Issue.1 , pp. 49-53
    • GONG, L.1
  • 17
    • 0002783180 scopus 로고
    • Using one-way functions for authentication
    • (Oct.)
    • GONG, L. 1989. Using one-way functions for authentication. Comput. Commun. Rev. 19, 5 (Oct.), 8-11.
    • (1989) Comput. Commun. Rev. , vol.19 , Issue.5 , pp. 8-11
    • GONG, L.1
  • 18
    • 84976698771 scopus 로고
    • TEMPO-A network time controller for a distributed Berkeley UNIX system
    • USENIX Assoc., Berkeley, Calif.
    • GUSELLA, R., AND ZATTI, S. 1984. TEMPO-A network time controller for a distributed Berkeley UNIX system. In Proceedings of the USENIX Summer Conference. USENIX Assoc., Berkeley, Calif., 78-85.
    • (1984) Proceedings of the USENIX Summer Conference , pp. 78-85
    • GUSELLA, R.1    ZATTI, S.2
  • 19
    • 84977284109 scopus 로고
    • How to make replicated data secure
    • C. Pomerance, Ed. Lecture Notes in Computer Science, Springer-Verlag, New York
    • HERLIHY, M. P., AND TYGAR, J. D. 1988. How to make replicated data secure. In Advances in Cryptology-CRYPTO '87 Proceedings, C. Pomerance, Ed. Lecture Notes in Computer Science, vol. 293. Springer-Verlag, New York, 379-391.
    • (1988) Advances in Cryptology-CRYPTO '87 Proceedings , vol.293 , pp. 379-391
    • HERLIHY, M.P.1    TYGAR, J.D.2
  • 20
    • 2342660026 scopus 로고
    • Towards the elimination of the effects of malicious logic: Fault tolerance approaches
    • NBS/NCSC, Baltimore, Md.
    • JOSEPH, M. K. 1987. Towards the elimination of the effects of malicious logic: Fault tolerance approaches. In Proceedings of the 10th NBS/NCSC National Computer Security Conference. NBS/NCSC, Baltimore, Md., 238-244.
    • (1987) Proceedings of the 10th NBS/NCSC National Computer Security Conference , pp. 238-244
    • JOSEPH, M.K.1
  • 22
    • 0040268965 scopus 로고
    • Internet privacy enhanced mail
    • (Aug.)
    • KENT, S. T. 1993. Internet privacy enhanced mail. Commun. ACM 36, 8 (Aug.), 48-60.
    • (1993) Commun. ACM , vol.36 , Issue.8 , pp. 48-60
    • KENT, S.T.1
  • 24
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • (July)
    • LAMPORT, L. 1978. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (July), 558-565.
    • (1978) Commun. ACM , vol.21 , Issue.7 , pp. 558-565
    • LAMPORT, L.1
  • 25
    • 0026684778 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • (Nov.)
    • LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • LAMPSON, B.1    ABADI, M.2    BURROWS, M.3    WOBBER, E.4
  • 26
    • 84976743475 scopus 로고
    • Tolerating failures of continuous-valued sensors
    • (Nov.)
    • MARZULLO, K. 1990. Tolerating failures of continuous-valued sensors. ACM Trans. Comput. Syst. 8, 4 (Nov.), 284-304.
    • (1990) ACM Trans. Comput. Syst. , vol.8 , Issue.4 , pp. 284-304
    • MARZULLO, K.1
  • 27
    • 0003871309 scopus 로고
    • RFC 1119: Network Time Protocol (version 2) specification and implementation
    • Internet Activities Board. Sept
    • MILLS, D. L. 1989. RFC 1119: Network Time Protocol (version 2) specification and implementation. Internet Activities Board. Sept.
    • (1989)
    • MILLS, D.L.1
  • 28
    • 84969337256 scopus 로고
    • Federation Information Processing Standards Publication 46, Government Printing Office, Washington, D.C.
    • NATIONAL BUREAU OF STANDARDS 1977. Data encryption standard. Federation Information Processing Standards Publication 46, Government Printing Office, Washington, D.C.
    • (1977) Data encryption standard
  • 29
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • (Dec.)
    • NEEDHAM, R. M., AND SCHROEDER, M. D. 1978. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec.), 993-999.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • NEEDHAM, R.M.1    SCHROEDER, M.D.2
  • 30
    • 0024716226 scopus 로고
    • Preserving and using context information in interprocess communication
    • (Aug.)
    • PETERSON, L. L., BUCHHOLZ, N. C., AND SCHLICHTING, R. D. 1989. Preserving and using context information in interprocess communication. ACM Trans. Comput. Syst. 7, 3 (Aug.), 217-246.
    • (1989) ACM Trans. Comput. Syst. , vol.7 , Issue.3 , pp. 217-246
    • PETERSON, L.L.1    BUCHHOLZ, N.C.2    SCHLICHTING, R.D.3
  • 33
  • 36
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • A. J. Menezes and S. A. Vanstone, Eds. Lecture Notes in Computer Science, Springer-Verlag, New York
    • RIVEST, R. L. 1991. The MD4 message digest algorithm. In Advances in Cryptology-CRYPTO '90 Proceedings, A. J. Menezes and S. A. Vanstone, Eds. Lecture Notes in Computer Science, vol. 537. Springer-Verlag, New York, 303-311.
    • (1991) Advances in Cryptology-CRYPTO '90 Proceedings , vol.537 , pp. 303-311
    • RIVEST, R.L.1
  • 37
    • 0003602325 scopus 로고
    • RFC 1321: The MD5 message-digest algorithm
    • Internet Activities Board
    • RIVEST, R. L., AND DUSSE, S. 1992. RFC 1321: The MD5 message-digest algorithm. Internet Activities Board.
    • (1992)
    • RIVEST, R.L.1    DUSSE, S.2
  • 38
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • (Feb.)
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (Feb.), 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • RIVEST, R.L.1    SHAMIR, A.2    ADLEMAN, L.3
  • 39
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • (Dec.)
    • SCHNEIDER, F. B. 1990. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comput. Surv. 22, 4 (Dec.), 299-319.
    • (1990) ACM Comput. Surv. , vol.22 , Issue.4 , pp. 299-319
    • SCHNEIDER, F.B.1
  • 40
    • 0001857259 scopus 로고
    • An overview of clock synchronization
    • B. Simons and A, Spector, Eds. Lecture Notes in Computer Science, Springer-Verlag, New York
    • SIMONS, B., WELCH, J. L., AND LYNCH, N. 1990. An overview of clock synchronization. In Fault-Tolerant Distributed Computing, B. Simons and A, Spector, Eds. Lecture Notes in Computer Science, vol. 448. Springer-Verlag, New York, 84-96.
    • (1990) Fault-Tolerant Distributed Computing , vol.448 , pp. 84-96
    • SIMONS, B.1    WELCH, J.L.2    LYNCH, N.3
  • 42
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • USENIX Assoc., Berkeley, Calif.
    • STEINER, J. G., NEUMAN, C., AND SCHILLER, J. I. 1988. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter Conference. USENIX Assoc., Berkeley, Calif., 191-202.
    • (1988) Proceedings of the USENIX Winter Conference , pp. 191-202
    • STEINER, J.G.1    NEUMAN, C.2    SCHILLER, J.I.3
  • 45
    • 0026973508 scopus 로고
    • Message authentication with one-way hash functions
    • IEEE, New York
    • TSUDIK, G. 1992. Message authentication with one-way hash functions. In Proceedings of IEEE INFOCOM '92. IEEE, New York, 2055-2059.
    • (1992) Proceedings of IEEE INFOCOM '92 , pp. 2055-2059
    • TSUDIK, G.1
  • 46
    • 0003156767 scopus 로고
    • Heilman presents no shortcut solutions to the DES
    • (July)
    • TUCHMAN, W. 1979. Heilman presents no shortcut solutions to the DES. IEEE Spectrum 16, 7 (July), 40-41.
    • (1979) IEEE Spectrum , vol.16 , Issue.7 , pp. 40-41
    • TUCHMAN, W.1
  • 48
    • 84952566785 scopus 로고
    • Strongbox
    • J. L. Eppinger, L. B. Mummert, and A. Z. Spector, Eds. Morgan Kaufmann, San Mateo, Calif.
    • TYGAR, J. D., AND YEE, B. S. 1991. Strongbox. In Camelot and Avalon, A Distributed Transaction Facility, J. L. Eppinger, L. B. Mummert, and A. Z. Spector, Eds. Morgan Kaufmann, San Mateo, Calif., 381-400.
    • (1991) Camelot and Avalon, A Distributed Transaction Facility , pp. 381-400
    • TYGAR, J.D.1    YEE, B.S.2
  • 50
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • (June)
    • VOYDOCK, V. L., AND KENT, S. T. 1983. Security mechanisms in high-level network protocols. ACM Comput. Surv. 15, 2 (June), 135-171.
    • (1983) ACM Comput. Surv. , vol.15 , Issue.2 , pp. 135-171
    • VOYDOCK, V.L.1    KENT, S.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.