The Theory and Practice of Concurrency
The Theory and Practice of Concurrency
Analysis of Real-Time Concurrent System Models based on CSP Using Stochastic Petri Nets
Proceedings of the 12th European Simulation Multiconference on Simulation - Past, Present and Future
Casper: A Compiler for the Analysis of Security Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A Logic for Constraint-based Security Protocol Analysis
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
A Directed Graph-Based Authentication Protocol Model and Its Security Analysis
FCST '06 Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology
An Improved Security Protocol Formal Analysis with BAN Logic
ECBI '09 Proceedings of the 2009 International Conference on Electronic Commerce and Business Intelligence
Formal Analysis for Security of Otway-Rees Protocol with BAN Logic
DBTA '09 Proceedings of the 2009 First International Workshop on Database Technology and Applications
Security Analysis of the Kerberos Protocol Using BAN Logic
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |
Parallel distributed systems are widely used for dealing with massive data sets and high performance computing. Securing parallel distributed systems is problematic. Centralized security tools are likely to cause bottlenecks and introduce a single point of failure. Exascale storage systems should have advantages in performance and flexibility over conventional storage systems used in high performance computing. To avoid 're-inventing the wheel' we prefer securing the storage system by using existing authentication and authorization methods. It is also more secure, since existing tools have already been debugged and peer-reviewed. In this paper, the focus is on evaluating 'Designed-In-Security' systems implemented for a distributed file system of exascale capacity. Designed-In-Security systems need to be evaluated for its capability to design, develop, and evolve high-assurance software, which is predictable and reliable while managing risk, cost, schedule, quality, and complexity.