13 research outputs found

    A Distributed Security Architecture for Large Scale Systems

    Get PDF
    This thesis describes the research leading from the conception, through development, to the practical implementation of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open Systems Interconnection (OSI) model. The Comprehensive Security System (CSS) is arranged basically as an Application Layer service but can allow any of the ISO recommended security facilities to be provided at any layer of the model. It is suitable as an 'add-on' service to existing arrangements or can be fully integrated into new applications. For large scale, distributed processing operations, a network of security management centres (SMCs) is suggested, that can help to ensure that system misuse is minimised, and that flexible operation is provided in an efficient manner. The background to the OSI standards are covered in detail, followed by an introduction to security in open systems. A survey of existing techniques in formal analysis and verification is then presented. The architecture of the CSS is described in terms of a conceptual model using agents and protocols, followed by an extension of the CSS concept to a large scale network controlled by SMCs. A new approach to formal security analysis is described which is based on two main methodologies. Firstly, every function within the system is built from layers of provably secure sequences of finite state machines, using a recursive function to monitor and constrain the system to the desired state at all times. Secondly, the correctness of the protocols generated by the sequences to exchange security information and control data between agents in a distributed environment, is analysed in terms of a modified temporal Hoare logic. This is based on ideas concerning the validity of beliefs about the global state of a system as a result of actions performed by entities within the system, including the notion of timeliness. The two fundamental problems in number theory upon which the assumptions about the security of the finite state machine model rest are described, together with a comprehensive survey of the very latest progress in this area. Having assumed that the two problems will remain computationally intractable in the foreseeable future, the method is then applied to the formal analysis of some of the components of the Comprehensive Security System. A practical implementation of the CSS has been achieved as a demonstration system for a network of IBM Personal Computers connected via an Ethernet LAN, which fully meets the aims and objectives set out in Chapter 1. This implementation is described, and finally some comments are made on the possible future of research into security aspects of distributed systems.IBM (United Kingdom) Laboratories Hursley Park, Winchester, U

    The Ethics of Occultic Communication: An Invocation of Joshua Gunn and Sissela Bok

    Get PDF
    Occultic rhetoric, according to Joshua Gunn, is a genre of discourse concerned with the study and practice of secret communications. The strategic sharing of secret messages involves a host of methods and conventions designed for the selective disclosure of hidden knowledge, thus controlling the boundaries of (and accessibility to power between) insider and outsider groups. Occultic rhetoric has its uses in everyday encounters, but the abuse of such manipulative strategies, especially by those in the academy and other positions of power and trust, calls for an ethical response. This dissertation submits occultic rhetoric to moral investigation by incorporating the works of Sissela Bok who examined the ethics of both secrecy and lying. By applying her principles to case studies of deliberately disguised or distorted messages in academic settings, this project suggests an approach for the moral exercise of secret communications, otherwise known as an ethics of occultic rhetoric

    Secrecy enhancement of block ciphered systems with deliberate noise in Non-coherent scenario

    No full text
    In this paper we propose an encoding-encryption approach to take advantage of intentional noise introduced in ciphertexts for a block cipher working in CFB or CBC mode. First of all, we provide a rigorous analysis of the impacts of channel degradation on block ciphered systems. We show that the overall channel can be modeled as a Finite State Markov Chain (FSMC) with symmetric channels associated in each state, whose underlying non-coherent Shannon capacity is derived and computed. Despite Eve\u27s efforts in modifying her linear crytanalysis given the intercepted noisy ciphertexts, there is still a non-negligible probability of having possible failures in her attack. We essentially create a wiretap channel in application layer that is a degraded version of the main channel and measure security of the system in terms of secrecy capacity and show that it depends on the deliberately introduced bit error rate. In addition, Alice can accordingly adjust cross over probability of the channel to maximize secrecy rate. This secrecy rate can be achieved by wiretap channel coding over multiple frames in application layer if the delay in system is bearable. © 2013 IEEE

    Resilience-Building Technologies: State of Knowledge -- ReSIST NoE Deliverable D12

    Get PDF
    This document is the first product of work package WP2, "Resilience-building and -scaling technologies", in the programme of jointly executed research (JER) of the ReSIST Network of Excellenc

    Telemedicine

    Get PDF
    Telemedicine is a rapidly evolving field as new technologies are implemented for example for the development of wireless sensors, quality data transmission. Using the Internet applications such as counseling, clinical consultation support and home care monitoring and management are more and more realized, which improves access to high level medical care in underserved areas. The 23 chapters of this book present manifold examples of telemedicine treating both theoretical and practical foundations and application scenarios

    Social work with airports passengers

    Get PDF
    Social work at the airport is in to offer to passengers social services. The main methodological position is that people are under stress, which characterized by a particular set of characteristics in appearance and behavior. In such circumstances passenger attracts in his actions some attention. Only person whom he trusts can help him with the documents or psychologically

    Foundations of secure computation

    Get PDF
    Issued as Workshop proceedings and Final report, Project no. G-36-61

    Texas Law Review

    Get PDF
    Journal containing articles, notes, book reviews, and other analyses of law and legal cases

    A Usable Collection: Essays in Honour of Jaap Kloosterman on Collecting Social History

    Get PDF
    Established in 1935, the International Institute of Social History (IISH) is one of the world’s leading research institutes focused on social history and holds one of the richest collections in the field. This volume brings together thirty-five essays in honor of the IISH’s longtime director Jaap Kloosterman, who built the institute into a world leader in the field
    corecore