13 research outputs found
A Distributed Security Architecture for Large Scale Systems
This thesis describes the research leading from the conception, through development, to the practical
implementation of a comprehensive security architecture for use within, and as a value-added enhancement
to, the ISO Open Systems Interconnection (OSI) model.
The Comprehensive Security System (CSS) is arranged basically as an Application Layer service but can
allow any of the ISO recommended security facilities to be provided at any layer of the model. It is
suitable as an 'add-on' service to existing arrangements or can be fully integrated into new applications.
For large scale, distributed processing operations, a network of security management centres (SMCs) is
suggested, that can help to ensure that system misuse is minimised, and that flexible operation is provided
in an efficient manner.
The background to the OSI standards are covered in detail, followed by an introduction to security in open
systems. A survey of existing techniques in formal analysis and verification is then presented. The
architecture of the CSS is described in terms of a conceptual model using agents and protocols, followed
by an extension of the CSS concept to a large scale network controlled by SMCs.
A new approach to formal security analysis is described which is based on two main methodologies.
Firstly, every function within the system is built from layers of provably secure sequences of finite state
machines, using a recursive function to monitor and constrain the system to the desired state at all times.
Secondly, the correctness of the protocols generated by the sequences to exchange security information
and control data between agents in a distributed environment, is analysed in terms of a modified temporal
Hoare logic. This is based on ideas concerning the validity of beliefs about the global state of a system
as a result of actions performed by entities within the system, including the notion of timeliness.
The two fundamental problems in number theory upon which the assumptions about the security of the
finite state machine model rest are described, together with a comprehensive survey of the very latest
progress in this area. Having assumed that the two problems will remain computationally intractable in
the foreseeable future, the method is then applied to the formal analysis of some of the components of the
Comprehensive Security System.
A practical implementation of the CSS has been achieved as a demonstration system for a network of IBM
Personal Computers connected via an Ethernet LAN, which fully meets the aims and objectives set out
in Chapter 1. This implementation is described, and finally some comments are made on the possible
future of research into security aspects of distributed systems.IBM (United Kingdom) Laboratories
Hursley Park, Winchester, U
The Ethics of Occultic Communication: An Invocation of Joshua Gunn and Sissela Bok
Occultic rhetoric, according to Joshua Gunn, is a genre of discourse concerned with the study and practice of secret communications. The strategic sharing of secret messages involves a host of methods and conventions designed for the selective disclosure of hidden knowledge, thus controlling the boundaries of (and accessibility to power between) insider and outsider groups. Occultic rhetoric has its uses in everyday encounters, but the abuse of such manipulative strategies, especially by those in the academy and other positions of power and trust, calls for an ethical response. This dissertation submits occultic rhetoric to moral investigation by incorporating the works of Sissela Bok who examined the ethics of both secrecy and lying. By applying her principles to case studies of deliberately disguised or distorted messages in academic settings, this project suggests an approach for the moral exercise of secret communications, otherwise known as an ethics of occultic rhetoric
Secrecy enhancement of block ciphered systems with deliberate noise in Non-coherent scenario
In this paper we propose an encoding-encryption approach to take advantage of intentional noise introduced in ciphertexts for a block cipher working in CFB or CBC mode. First of all, we provide a rigorous analysis of the impacts of channel degradation on block ciphered systems. We show that the overall channel can be modeled as a Finite State Markov Chain (FSMC) with symmetric channels associated in each state, whose underlying non-coherent Shannon capacity is derived and computed. Despite Eve\u27s efforts in modifying her linear crytanalysis given the intercepted noisy ciphertexts, there is still a non-negligible probability of having possible failures in her attack. We essentially create a wiretap channel in application layer that is a degraded version of the main channel and measure security of the system in terms of secrecy capacity and show that it depends on the deliberately introduced bit error rate. In addition, Alice can accordingly adjust cross over probability of the channel to maximize secrecy rate. This secrecy rate can be achieved by wiretap channel coding over multiple frames in application layer if the delay in system is bearable. © 2013 IEEE
Resilience-Building Technologies: State of Knowledge -- ReSIST NoE Deliverable D12
This document is the first product of work package WP2, "Resilience-building and -scaling technologies", in the programme of jointly executed research (JER) of the ReSIST Network of Excellenc
Telemedicine
Telemedicine is a rapidly evolving field as new technologies are implemented for example for the development of wireless sensors, quality data transmission. Using the Internet applications such as counseling, clinical consultation support and home care monitoring and management are more and more realized, which improves access to high level medical care in underserved areas. The 23 chapters of this book present manifold examples of telemedicine treating both theoretical and practical foundations and application scenarios
Social work with airports passengers
Social work at the airport is in to offer to passengers social services. The main
methodological position is that people are under stress, which characterized by a
particular set of characteristics in appearance and behavior. In such circumstances
passenger attracts in his actions some attention. Only person whom he trusts can help him
with the documents or psychologically
Foundations of secure computation
Issued as Workshop proceedings and Final report, Project no. G-36-61
Texas Law Review
Journal containing articles, notes, book reviews, and other analyses of law and legal cases
A Usable Collection: Essays in Honour of Jaap Kloosterman on Collecting Social History
Established in 1935, the International Institute of Social History (IISH) is one of the world’s leading research institutes focused on social history and holds one of the richest collections in the field. This volume brings together thirty-five essays in honor of the IISH’s longtime director Jaap Kloosterman, who built the institute into a world leader in the field