Proceedings of the 2002 Workshop on New Security Paradigms 2002
DOI: 10.1145/844102.844109
|View full text |Cite
|
Sign up to set email alerts
|

Breaking the barriers

Abstract: This paper attempts to reconcile the high performance community's requirement of high performance with the need for security, and reconcile some accepted security approaches with the performance constraints of high-performance networks. We propose a new paradigm and challenge existing practice. The new paradigm is that not all domains need longterm forward data confidentiality. In particular, we take a fresh look at security for the high-performance domain, focusing particularly on component-based applications… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2003
2003
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…These applications require protection in terms of privacy and security of data due to vulnerability of environment which is open. The protection parameters can be data privacy (Connelly & Chien, 2002), data integrity check (Tuecke, Foster, Karonis, & Kesselman,1998), software execution protection (Shi W., Lee H.H.S., Lu C., and Ghosh M.,2005) and authentication. To better understand the security threat to an application we will look into a example of stock quote update and trading application in which incoming requests coming from different business partner while outgoing response from an enterprise back-end machines are prone to security attack.…”
Section: Protection In Rtds: Security and Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…These applications require protection in terms of privacy and security of data due to vulnerability of environment which is open. The protection parameters can be data privacy (Connelly & Chien, 2002), data integrity check (Tuecke, Foster, Karonis, & Kesselman,1998), software execution protection (Shi W., Lee H.H.S., Lu C., and Ghosh M.,2005) and authentication. To better understand the security threat to an application we will look into a example of stock quote update and trading application in which incoming requests coming from different business partner while outgoing response from an enterprise back-end machines are prone to security attack.…”
Section: Protection In Rtds: Security and Privacymentioning
confidence: 99%
“…These applications which are distributed in nature sometimes require timely completion of task termed as real time distributed system. Online trading systems (Ahmed & Vrbsky,1998), Online Banking, Online multimedia applications, Real time database system, Medical electronics (Gritzalis, 2004), Aircraft control systems (Abdelzaher et al, 2000), Scientific parallel computing (Connelly & Chien, 2002), Missile Tracking system (Mahafza et al,1998), Power grid distribution system are examples of such type of applications which are growing very rapidly. These applications are distributed in nature and also require that they should adhere by the timing constraints imposed by application in form of deadline.…”
Section: Introductionmentioning
confidence: 99%