A note on denial-of-service in operating systems
IEEE Transactions on Software Engineering
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
A Specification and Verification Method for Preventing Denial of Service
IEEE Transactions on Software Engineering
How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
CRYPTO '89 Proceedings on Advances in cryptology
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
The official PGP user's guide
Impossibility of distributed consensus with one faulty process
Journal of the ACM (JACM)
Distributing trust with the Rampart toolkit
Communications of the ACM
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
The proactive security toolkit and applications
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure distributed storage and retrieval
Theoretical Computer Science
The &OHgr; key management service
Journal of Computer Security
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
A cost-based framework for analysis of denial of service in networks
Journal of Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Shared Generation of Authenticators and Signatures (Extended Abstract)
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Maintaining Security in the Presence of Transient Faults
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Simplified Approach to Threshold and Proactive RSA
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
The Rampart Toolkit for Building High-Integrity Services
Selected Papers from the International Workshop on Theory and Practice in Distributed Systems
Certificate Recocation: Mechanics and Meaning
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Can We Eliminate Certificate Revocations Lists?
FC '98 Proceedings of the Second International Conference on Financial Cryptography
On Certificate Revocation and Validation
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Revocation: Options and Challenges
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A Response to ''Can We Eliminate Certificate Revocation Lists?''
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks
CMS '99 Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
From Crash Fault-Tolerance to Arbitrary-Fault Tolerance: Towards a Modular Approach
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Distributing Trust on the Internet
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Some Recent Research Aspects of Threshold Cryptography
ISW '97 Proceedings of the First International Workshop on Information Security
Distributed Public Key Cryptosystems
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Optimal-resilience proactive public-key cryptosystems
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Secure and Scalable Replication in Phalanx
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
Abstractions for Devising Byzantine-Resilient State Machine Replication
SRDS '00 Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems
Recent-secure authentication: enforcing revocation in distributed systems
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Distributed Computing
Proactive recovery in a Byzantine-fault-tolerant system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Building intrusion tolerant applications
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Manycast: exploring the space between anycast and multicast in ad hoc networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Separating agreement from execution for byzantine fault tolerant services
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Automatic generation of two-party computations
Proceedings of the 10th ACM conference on Computer and communications security
Byzantine disk paxos: optimal resilience with byzantine shared memory
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
The design and implementation of a next generation name service for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
CODEX: A Robust and Secure Secret Distribution System
IEEE Transactions on Dependable and Secure Computing
ARECA: a highly attack resilient certification authority
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
APSS: proactive secret sharing in asynchronous systems
ACM Transactions on Information and System Security (TISSEC)
Implementing Trustworthy Services Using Replicated State Machines
IEEE Security and Privacy
Fault-scalable Byzantine fault-tolerant services
Proceedings of the twentieth ACM symposium on Operating systems principles
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
MIDDLE-R: Consistent database replication at the middleware level
ACM Transactions on Computer Systems (TOCS)
IEEE Transactions on Dependable and Secure Computing
Proactive resilience through architectural hybridization
Proceedings of the 2006 ACM symposium on Applied computing
Safety and consistency in policy-based authorization systems
Proceedings of the 13th ACM conference on Computer and communications security
Inner-Circle Consistency for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Worm-IT - A wormhole-based intrusion-tolerant group communication system
Journal of Systems and Software
Secure data replication over untrusted hosts
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees
Proceedings of the 12th ACM symposium on Access control models and technologies
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Antiquity: exploiting a secure log for wide-area distributed storage
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Hidden problems of asynchronous proactive recovery
HotDep'07 Proceedings of the 3rd workshop on on Hot Topics in System Dependability
Implementation of voting mechanism in intrusion tolerance system
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
The FOREVER service for fault/intrusion removal
Proceedings of the 2nd workshop on Recent advances on intrusiton-tolerant systems
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
An efficient anycast scheme for discovering K services in mobile ad-hoc networks
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
Tiered fault tolerance for long-term integrity
FAST '09 Proccedings of the 7th conference on File and storage technologies
Hiding Data Sources in P2P Networks
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Functional decomposition and interactions in hybrid intrusion-tolerant systems
Proceedings of the 3rd International DiscCoTec Workshop on Middleware-Application Interaction
PKIX Certificate Status in Hybrid MANETs
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Proactive Byzantine Quorum Systems
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Fault-tolerant authentication services
International Journal of Computers and Applications
Authenticated dictionaries for fresh attribute credentials
iTrust'03 Proceedings of the 1st international conference on Trust management
Intrusion-tolerant architectures: concepts and design
Architecting dependable systems
On the consistency of distributed proofs with hidden subtrees
ACM Transactions on Information and System Security (TISSEC)
Dependability metrics
Comparison of access control methods in mobile as-hoc networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
User-centric handling of identity agent compromise
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
On the insecurity of proactive RSA in the URSA mobile ad hoc network access control protocol
IEEE Transactions on Information Forensics and Security
Analysis of techniques for building intrusion tolerant server systems
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
VPSS: a verifiable proactive secret sharing scheme in distributed systems
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Beyond one-third faulty replicas in byzantine fault tolerant systems
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Ensuring content integrity for untrusted peer-to-peer content distribution networks
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
SOMA: self-organised mesh authentication
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Reputation based localized access control for mobile ad-hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
A first look at peer-to-peer worms: threats and defenses
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
A grid-based manycast scheme for large mobile ad hoc networks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Peer-to-Peer authentication with a distributed single sign-on service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
TrustedPals: secure multiparty computation implemented with smart cards
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Generic on-line/off-line threshold signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
DSO: dependable signing overlay
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
State machine replication with byzantine faults
Replication
Integrating fault-tolerant techniques into the design of critical systems
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Security and Communication Networks
Secure federation of semantic information services
Decision Support Systems
Bolt: data management for connected homes
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
COCA is a fault-tolerant and secure online certification authority that has been built and deployed both in a local area network and in the Internet. Extremely weak assumptions characterize environments in which COCA's protocols execute correctly: no assumption is made about execution speed and message delivery delays; channels are expected to exhibit only intermittent reliability; and with 3t + 1 COCA servers up to t may be faulty or compromised. COCA is the first system to integrate a Byzantine quorum system (used to achieve availability) with proactive recovery (used to defend against mobile adversaries which attack, compromise, and control one replica for a limited period of time before moving on to another). In addition to tackling problems associated with combining fault-tolerance and security, new proactive recovery protocols had to be developed. Experimental results give a quantitative evaluation for the cost and effectiveness of the protocols.