Local-area distributed systems
IBM Systems Journal
A protocol for route establishment and packet forwarding across multidomain internets
IEEE/ACM Transactions on Networking (TON)
A graduate course in computing security technology
SIGCSE '93 Proceedings of the twenty-fourth SIGCSE technical symposium on Computer science education
Modelling multidomain security
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
Journal of Computing Sciences in Colleges
Massively distributed systems: design issues and challenges
WOES'99 Proceedings of the Workshop on Embedded Systems on Workshop on Embedded Systems
Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hi-index | 0.00 |
Recent work examining distributed system security requirements. is critiqued. A notion of trust based on distributed system topology and distributed system node evaluation levels proposed in that work is shown to be deficient. The notion fails to make allowances for the distributed system physical security environment, security factors related to the management of distributed systems by more than one jurisdictive authority, and the interactions that can occur between nodes supporting different mandatory and discretionary security mechanisms.