Spring
2006
|
Jan
23
|
Secure
Spread: An Integrated Architecture for Secure Group
Communication, Amir et al, IEEE Transactions on
Dependable and Secure Computing, 2(3), July-September
2005. [Summary]
|
Jan
30
|
An
Auctioning Reputation System Based on Anomaly Detection
Rubin, S; Christodorescu, M; Ganapathy, V; Giffin, J.
T.; Kruger, L; Wang, H, 12th ACM Conference on Computer and
Communications Security [Summary]
|
Feb 6
|
A
DOS-limiting Network Architecture Yang, X; Weatherall,
D; Anderson, T, ACM SIGCOMM 2005
|
|
For
the next 5 weeks we will be studying papers about Secure and
Dependable Computing
|
Feb 13
|
Implementing
Trustworthy Services Using Replicated State Machines
Fred B. Schneider and Lidong Zhou, IEEE Security and
Privacy, Volume 3, Number 5 (September/October 2005),
34--43.
|
Feb 20
|
The
Byzantine Generals Problem, Leslie Lamport, Robert
Shostak, and Marshall Pease, ACM Transactions on Programming
Languages and Systems, Volume 4, Number 3 (July 1982),
382--401.
Impossibility
of Distributed Consensus with One Faulty Process Michael
J. Fisher, Nancy A. Lynch, and Michael S. Paterson, Journal
of the Association for Computing Machinery, Volume 32,
Number 2 (April 1985), 374--382.
|
Feb 27
|
How
to Share a Secret Adi Shamir, Communications of the ACM,
Volume 22, Number 11 (November 1979), 612--613. [Summary]
Proactive
secret sharing or: How to cope with perpetual leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti
Yung. In Crypto'95. [Summary]
[OPTIONAL]
Some
Recent Research Aspects of Threshold Cryptography. Yvo
Desmedt, In E. Okamoto, G. Davida and M. Mambo, editors,
Information Security, Proceedings (Lecture Notes in Computer
Science 1396), pp. 158-173. Springer-Verlag, 1997.
Tatsunokuchi, Ishikawa, Japan, September.
|
Mar 6
|
Transparent
Runtime Randomization for Security, Jun Xu, Zbigniew
Kalbarczyk, and Ravishankar K. Iyer, UIUC CRHC Technical
Report CRHC-03-03, May 2003. [Summary]
On
achieving software diversity for improved network security
using distributed coloring algorithms, Adam J. O'Donnell
and Harish Sethu, 11th ACM Conference on Computer and
Communications Security, October 2004, 121--131. [Summary]
|
Mar 13
|
COCA:
A secure distributed on-line certification authority,
Lidong Zhou and Fred B. Schneider, ACM Transactions on
Computer Systems Volume 20, Number 4 (November 2002),
329--368.
Secure
intrusion-tolerant replication on the Internet.
Christian Cachin and Jonathan A. Poritz. In Proc. Intl.
Conference on Dependable Systems and Networks (DSN-2002),
pages 167-176, June 2002.
|
Mar 27
|
Fit:
Fast Internet Traceback. Abraham Yaar, Adrian Perrig,
and Dawn Song. In IEEE InfoCom, March 2005
|
Apr 2
|
Countering
DoS attacks with stateless multipath overlays. Angelos
Stavrou, Angelos D. Keromytis, Columbia University CCS 2005
|
Apr 10
|
New
Approaches for Deniable Authentication.M. Di Raimondo
and R. Gennaro, CCS 2005
|
Apr 17
|
Using
Attack Injection to Discover New Vulnerabilities. Nuno
Neves, Jo.ao Antunes, Miguel Correia, Paulo Ver�issimo,
Rui Neves DSN 2006
|
Apr 24
|
Retrofitting
legacy code for authorization policy enforcement.Vinod
Ganapathy, Trent Jaeger, and Somesh Jha. In 2006 IEEE
Symposium on Security and Privacy. Oakland, California, May
2006.
|
|
|