Andrew: a distributed personal computing environment
Communications of the ACM - The MIT Press scientific computation series
File access performance of diskless workstations
ACM Transactions on Computer Systems (TOCS)
Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Using idle workstations in a shared computing environment
SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
The ITC distributed file system: principles and design
Proceedings of the tenth ACM symposium on Operating systems principles
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Grapevine: an exercise in distributed computing
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
A note on the confinement problem
Communications of the ACM
The distributed V kernel and its performance for diskless workstations
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Protection in programmed systems.
Protection in programmed systems.
Resource sharing in a network of personal computers
Resource sharing in a network of personal computers
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
ACM Transactions on Computer Systems (TOCS)
Coda: A Highly Available File System for a Distributed Workstation Environment
IEEE Transactions on Computers
Distributed file systems: concepts and examples
ACM Computing Surveys (CSUR)
The Influence of Scale on Distributed File System Design
IEEE Transactions on Software Engineering
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Integration of security in network routing protocols
ACM SIGSAC Review
Recent trends in experimental operating systems research
PODC '93 Proceedings of the twelfth annual ACM symposium on Principles of distributed computing
A distributed system architecture for a distributed application environment
IBM Systems Journal
A quantitative analysis of cache policies for scalable network file systems
SIGMETRICS '94 Proceedings of the 1994 ACM SIGMETRICS conference on Measurement and modeling of computer systems
Support for the file system security requirements of computational E-mail systems
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
An empirical study of a wide-area distributed file system
ACM Transactions on Computer Systems (TOCS)
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
A non-timestamped authorization model for data management systems
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
AFS and the Web: competitors or collaborators?
ACM SIGOPS Operating Systems Review
New design concepts for an intelligent Internet
Communications of the ACM
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Proceedings of the 10th international conference on World Wide Web
Journal on Educational Resources in Computing (JERIC)
AFS and the web: competitors or collaborators?
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Transparent logging as a technique for debugging complex distributed systems
EW 5 Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Improving the granularity of access control for Windows 2000
ACM Transactions on Information and System Security (TISSEC)
The Journal of Supercomputing
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Resolving Conflicts in Authorization Delegations
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
InterWeave: A Middleware System for Distributed Shared State
LCR '00 Selected Papers from the 5th International Workshop on Languages, Compilers, and Run-Time Systems for Scalable Computers
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
CVS: A Compiler for the Analysis of Cryptographic Protocols
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
IEEE Pervasive Computing
CASCON '92 Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research - Volume 2
A semantics for web services authentication
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Decentralized Authentication Mechanisms for Object-based Storage Devices
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Securing distributed storage: challenges, techniques, and systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Static validation of security protocols
Journal of Computer Security
Protecting file systems with transient authentication
Wireless Networks
A semantics for web services authentication
Theoretical Computer Science - Theoretical foundations of security analysis and design II
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
A group-based authorization model for cooperative systems
ECSCW'97 Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A usage profile and evaluation of a wide-area distributed file system
WTEC'94 Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference
An MS-DOS file system for UNIX
WTEC'94 Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags
Electronic Notes in Theoretical Computer Science (ENTCS)
Decentralized access control in distributed file systems
ACM Computing Surveys (CSUR)
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Flexible Resolution of Authorisation Conflicts in Distributed Systems
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Minimal backups of cryptographic protocol runs
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Parameterized access control: from design to prototype
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Consistency checking of role assignments in inter-organizational collaboration
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Distributed and Parallel Databases
Modeling and analysis of authentication protocols using colored Petri nets
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Practical protection for personal storage in the cloud
Proceedings of the Third European Workshop on System Security
Policy-based access control for weakly consistent replication
Proceedings of the 5th European conference on Computer systems
Detecting and preventing type flaws at static time
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Supporting multiple access control policies in database systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Access rights – the keys to cooperative work/learning
MIS'04 Proceedings of the 2004 international conference on Metainformatics
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
A secure file sharing service for distributed computing environments
The Journal of Supercomputing
Hi-index | 0.02 |
Andrew is a distributed computing environment that is a synthesis of the personal computing and timesharing paradigms. When mature, it is expected to encompass over 5,000 workstations spanning the Carnegie Mellon University campus. This paper examines the security issues that arise in such an environment and describes the mechanisms that have been developed to address them. These mechanisms include the logical and physical separation of servers and clients, support for secure communication at the remote procedure call level, a distributed authentication service, a file-protection scheme that combines access lists with UNIX mode bits, and the use of encryption as a basic building block. The paper also discusses the assumptions underlying security in Andrew and analyzes the vulnerability of the system. Usage experience reveals that resource control, particularly of workstation CPU cycles, is more important than originally anticipated and that the mechanisms available to address this issue are rudimentary.