How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Towards a theory of software protection and simulation by oblivious RAMs
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
The duality of memory and communication in the implementation of a multiprocessor operating system
SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
Efficient computation on oblivious RAMs
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Camelot and Avalon: a distributed transaction facility
Camelot and Avalon: a distributed transaction facility
Inside Windows NT
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
GNU EMACS Manual
An Architectural Overview of QNX
Proceedings of the Workshop on Micro-kernels and Other Kernel Architectures
NetBill: An Internet commerce system optimized for network delivered services
COMPCON '95 Proceedings of the 40th IEEE Computer Society International Conference
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
Completely Asynchronous Optimistic Recovery with Minimal Rollbacks
FTCS '95 Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
Smart Cards
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
File server scaling with network-attached secure disks
SIGMETRICS '97 Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Atomicity in electronic commerce
netWorker
Cryptographic Verification of Test Coverage Claims
IEEE Transactions on Software Engineering
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Stack and Queue Integrity on Hostile Platforms
IEEE Transactions on Software Engineering
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Wireless Networks
A Pessimistic Approach to Trust in Mobile Agent Platforms
IEEE Internet Computing
SAM: A Flexible and Secure Auction Architecture Using Trusted Hardware
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Practical Mobile Digital Signatures
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Outbound Authentication for Programmable Secure Coprocessors
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Smartcards: Hot to Put them to Use in a User-Centric System
HUC '00 Proceedings of the 2nd international symposium on Handheld and Ubiquitous Computing
On Quorum Controlled Asymmetric Proxy Re-encryption
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Authentic data publication over the internet
Journal of Computer Security - IFIP 2000
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Security model for a multi-agent marketplace
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
SAFE-OPS: An approach to embedded software security
ACM Transactions on Embedded Computing Systems (TECS)
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Security of erasable memories against adaptive adversaries
Proceedings of the 2005 ACM workshop on Storage security and survivability
The case for transient authentication
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Protecting file systems with transient authentication
Wireless Networks
Reducing TCB complexity for security-sensitive applications: three case studies
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Side effects are not sufficient to authenticate software
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Copilot - a coprocessor-based kernel runtime integrity monitor
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Providing authentication to messages signed with a smart card in hostile environments
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Trusting trusted hardware: towards a formal model for programmable secure coprocessors
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Smart cards in hostile environments
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
WWW electronic commerce and java trojan horses
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
On the difficulty of validating voting machine software with software
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
A compiler-hardware approach to software protection for embedded systems
Computers and Electrical Engineering
Detecting code alteration by creating a temporary memory bottleneck
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
Prototyping an armored data vault rights management on Big Brother's computer
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Kells: a protection framework for portable data
Proceedings of the 26th Annual Computer Security Applications Conference
Implementing cryptography on TFT technology for secure display applications
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Secure mediation with mobile code
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Host-Based security sensor integrity in multiprocessing environments
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Pasture: secure offline data access using commodity trusted hardware
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Hi-index | 0.00 |
Many researchers believe electronic wallets (secure storage devices that maintain account balances) are the solution to electronic commerce challenges. This paper argues for a more powerful model--a secure coprocessor--that can run a small operating system, run application programs, and also keep secure storage for cryptographic keys and balance information. We have built a system called Dyad, on top of a port of the Mach 3.0 microkernel to the IBM Citadel secure coprocessor. This paper describes the abstract architecture of Dyad and a general discussion of secure coprocessor implementations of a variety of electronic commerce applications: • Copy protection for software • Electronic cash (including a critique of proposed solutions for point-of-sale electronic wallet systems) • Electronic contracts • Secure postage