Reliable communication in the presence of failures
ACM Transactions on Computer Systems (TOCS)
Exploiting virtual synchrony in distributed systems
SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
Preserving and using context information in interprocess communication
ACM Transactions on Computer Systems (TOCS)
Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
Implementing fault-tolerant services using the state machine approach: a tutorial
ACM Computing Surveys (CSUR)
An overview of clock synchronization
Fault-tolerant distributed computing
Tolerating failures of continuous-valued sensors
ACM Transactions on Computer Systems (TOCS)
Lightweight causal and atomic group multicast
ACM Transactions on Computer Systems (TOCS)
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Message authentication with one-way hash functions
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
Authentication in the Taos operating system
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Distributed process groups in the V Kernel
ACM Transactions on Computer Systems (TOCS)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Timestamps in key distribution protocols
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
Reliable Multicast between Micro-Kernels
Proceedings of the Workshop on Micro-kernels and Other Kernel Architectures
How to Make Replicated Data Secure
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Signed Vector Timestamps: A Secure Protocol for Partial Order Time
Signed Vector Timestamps: A Secure Protocol for Partial Order Time
Integrating Security in a Group Oriented Distributed System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
On Message Integrity in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Preventing Denial and Forgery of Causal Relationships in Distributed Systems
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A Secure Group Membership Protocol
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A Secure Group Membership Protocol
IEEE Transactions on Software Engineering
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
ACM Transactions on Information and System Security (TISSEC)
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Minimal backups of cryptographic protocol runs
Proceedings of the 6th ACM workshop on Formal methods in security engineering
VPSS: a verifiable proactive secret sharing scheme in distributed systems
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Hi-index | 0.00 |
Process groups are a common abstraction for fault-tolerant computing in distributed systems. We present a security architecture that extends the process group into a security abstraction. Integral parts of this architecture are services that securely and fault tolerantly support cryptographic key distribution. Using replication only when necessary, and introducing novel replication techniques when it was necessary, we have constructed these services both to be easily defensible against attack and to permit key distribution despite the transient unavailability of a substantial number of servers. We detail the design and implementation of these services and the secure process group abstraction they support. We also give preliminary performance figures for some common group operations.