Now showing items 1-13 of 13

    • Authentication v Certification 

      Low, M.R.; Christianson, B. (University of Hertfordshire, 1995)
      Authentication servers and certification authorities are usually viewed simply as alternative ways of providing the same service. In this paper we show that the differences in the natures of these two approaches are more ...
    • Discretionary non-repudiation 

      Low, M.R. (University of Hertfordshire, 1996)
      Non-repudiation is necessary when services are provided in a distributed and open computer system. In this paper we aim to clarify what is meant by non-repudiation, identify who needs it, and determine why it is needed. ...
    • Expressing a policy 

      Low, M.R. (University of Hertfordshire, 1996)
      Policies, in particular security policies, are typically modelled using access control lists. This technique is not sufficient to model the full 'semantics' of a policy, especially when it applies to a task executed in a ...
    • Fine grained object protection in UNIX 

      Low, M.R. (University of Hertfordshire, 1992)
      In this document we describe and discuss a solution, called UNIX Access Table Protection (UATP), to the problem of providing a secure environment for persistent object types with fine grained protection on a UNIX system. ...
    • A joint authorisation scheme 

      Low, M.R. (University of Hertfordshire, 1996)
      There are many situations where more than one principle needs to give authorisation so that a single function can take place. Self-Authenticating Proxies provide a mechanism which many be suitably employed to support the ...
    • Key-spoofing attacks on nested signature blocks 

      Christianson, B.; Low, M.R. (1995)
      For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ...
    • Minimal kernels and security 

      Low, M.R. (University of Hertfordshire, 1992)
      The purpose of this document is to investigate which facilities are required in a minimal kernel to provide an environment where users can be assured that certain levels of security will be enforced. Various features are ...
    • Nested signature blocks 

      Low, M.R.; Christianson, B. (University of Hertfordshire, 1995)
      For any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as ...
    • The Notary 

      Low, M.R. (University of Hertfordshire, 1992)
      In this document we discuss those functions performed by a notary and the requirements that such a functionary places on its environment, location and communications. The discussion takes place with specific reference to ...
    • Roles and rights 

      Low, M.R.; Christianson, B. (University of Hertfordshire, 1995)
      In this paper we describe and discuss a protection model designed by Coulouris and Dollimore to protect objects which are shared by different principals participating in a co-operative task. We then show that the ...
    • Self authenticating proxies 

      Low, M.R.; Christianson, B. (University of Hertfordshire, 1994)
      Authentication and access control are usually implemented as two separate protection mechanisms because they are logically separate functions. A consistent approach to both of these functions is proposed in this paper. In ...
    • Self defence in open systems using self authenticating proxies 

      Low, M.R. (University of Hertfordshire, 1993)
      Most of the methods currently used to protect both users and systems and their objects and servers, involve authentication of principals and access control of these objects and servers. Authentication and access control ...
    • Technique for authentication, access control and resource management in open distributed systems 

      Low, M.R.; Christianson, B. (1994)
      A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism ...