- 1 BOLT BERANEK AND NEWMAN INC. Specifications for the interconnection of a host and an IMP. Tech. Rep. 1822. Bolt Beranek and Newman Inc. Cambridge, Mass. Dec. 1981.Google Scholar
- 2 BRANSTAD, D.K. Security aspects of computer networks. AAIA Paper 73-427, AIAA Computer Network Systems Conference, Huntsville, Ala. Apr. 1973.Google Scholar
- 3 CORBATO, F.J., DAGGETT, M.M., DALE~, R.C., CREASY, R.J., HELLIWIG, J.D., ORENSTEIN, R.H., AND KORN, L.K. The Compatible Time-Sharing System, A Programmer's Guide. Massachusetts institute of Technology Press, Cambridge, Mass. 1963, p. 10. Google Scholar
- 4 DIFFIE, W., AND HELLMAN, M.E. New directions in cryptography. IEEE Trans. Inf. Theory IT-22, 6 (Nov. 1976), 644-654.Google Scholar
- 5 GRAY, J.N. Notes on database operating systems. Operating Systems: An Advanced Course. Lecture Notes on Computer Science, vol. 60. Springer-Verlag, New York. 1978. 393-481. Google Scholar
- 6 GREENWALD, M. Remote virtual disk protocol specifications. Tech. Memo. Massachusetts institute ~)f Technology Laboratory for Computer Science, Cambridge, Mass. In preparation.Google Scholar
- 7 KEISTER, W., KETCHLEDGE, R.W., AND VAUGHAN, H.E. No. 1 ESS: System organization and objectives. Bell Syst. Tech. J. 53, 5, Pt 1, (Sept. 1964), 1841.Google Scholar
- 8 KENT, S.T. Encryption-based protection protocols for interactive user-computer communication. S.M. thesis, Dept. of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass., May 1976. Also available as Tech. Rep. TR-162. Massachusetts Institute of Technology Laboratory for Computer Science, May 1976. Google Scholar
- 9 LAMPSON, B.W., AND SPROULL, R.F. An open operating system for a single-user machine. In Proceedings of the 7th Symposium on Operating Systems Principles, (Pacific Grove, Calif. Dec. 10- 12). ACM, New York, 1979, pp. 98-105. Google Scholar
- 10 LAMPSON, B., AND STURGIS, H. Crash recovery in a distributed data storage system. Working paper, Xerox PARC, Palo Alto, Calif. Nov. 1976 and Apr. 1979. Submitted for publication.Google Scholar
- 11 NEEDHAM, R.M., AND SCHROEDER, M.D. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999. Google Scholar
- 12 POPEK, G.J., et al. UCLA data secure unix. In Proceedings of the 1979 National Computer Conference, vol. AFIPS Press, Reston, Va., pp. 355-364.Google Scholar
- 13 REED, D.P. Implementing atomic actions on decentralized data. ACM Trans. Comput. Syst. 1, 1 (Feb. 1983), 3-23. Google Scholar
- 14 REED, D.P. Naming and synchronization in a decentralized computer system. Ph.D. dissertation, Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, Cambridge, Mass. September 1978. Also available as Massachusetts Institute of Technology Laboratory for Computer Science Tech. Rep. TR-205, Sept., 1978. Google Scholar
- 15 REED, D.P., AND SVOBODOVA, L. SWALLOW. A distributed data storage system for a local network. A. West, and P. Janson, Eds. In Local Networks for Computer Communications, Proceedings of the IFIP Working Group 6.4 International Workshop on Local Networks (Zurich, Aug 27-29 1980), North-Holland, Amsterdam, 1981, pp. 355-373.Google Scholar
- 16 SCHROEDER, M.D., CLARK, D.D., AND SALTZER, J.H. The multics kernel design project. In Proceedings 6th Symposium on Operating Systems Principles. Oper. Syst. Rev. 11, 5 (Nov. 1977), 43-56. Google Scholar
- 17 STERN, J.A. Backup and recovery of on-line information in a computer utility. S.M. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, Mass. Aug. 1973. Available as Project MAC Tech. Rep. TR-116, Massachusetts Institute of Technology, Jan. 1974. Google Scholar
Index Terms
- End-to-end arguments in system design
Recommendations
Design strategies and methods in interaction design: the past, present, and future
CHI EA '97: CHI '97 Extended Abstracts on Human Factors in Computing SystemsThe complexity of user interface design demands well-chosen strategies and methods to optimize the design process. This two day workshop is designed to provide the understanding and application of design strategies and methods [DS&M] for the development ...
On the security of fair non-repudiation protocols
Special issue on SC 2003We analyzed two non-repudiation protocols and found some new attacks on the fairness and termination property of these protocols. Our attacks are enabled by several inherent design weaknesses, which also apply to other non-repudiation protocols. To ...
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99: Proceedings of the 6th ACM conference on Computer and communications securityThe design of simple cryptographic protocols for elementary two-party (session oriented) tasks (such as entity authentication and key transport) has had a history (starting with [NS78]) where security has been quite evasive. Only recently we have seen ...
Comments