Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)
DOI: 10.1109/secpri.2003.1199340
|View full text |Cite
|
Sign up to set email alerts
|

Using replication and partitioning to build secure distributed systems

Abstract: A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. This paper describes a way to enforce policies for data confidentiality and integrity in such an environment. Programs annotated with security specifications are statically checked and then transformed by the compiler to run securely on a distributed system with untrusted hosts. The code and data of the computation are partitioned acro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(1 citation statement)
references
References 44 publications
0
1
0
Order By: Relevance
“…Moving from policies, the next several papers addressed distributed systems and Internet-connected systems. In " Using Replication and Partitioning to Build Secure Distributed Systems," Zheng et al 6 developed an approach to hardening computations running across a large number of shared personal computers. The application of concern was the use of spare computing cycles (to create computing power akin to supercomputers) and methods for guaranteeing the integrity and accounting of those computations.…”
Section: Th Anniversary Exclusivementioning
confidence: 99%
“…Moving from policies, the next several papers addressed distributed systems and Internet-connected systems. In " Using Replication and Partitioning to Build Secure Distributed Systems," Zheng et al 6 developed an approach to hardening computations running across a large number of shared personal computers. The application of concern was the use of spare computing cycles (to create computing power akin to supercomputers) and methods for guaranteeing the integrity and accounting of those computations.…”
Section: Th Anniversary Exclusivementioning
confidence: 99%