Search
Now showing items 21-30 of 41
Remote booting in a hostile world: to whom am I speaking? [Computer security]
(1995)
Today's networked computer systems are very vulnerable to attack: terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in ...
Authentication v Certification
(University of Hertfordshire, 1995)
Authentication servers and certification authorities are usually viewed simply as alternative ways of providing the same service. In this paper we show that the differences in the natures of these two approaches are more ...
Positive fixed points of lattices under semigroups of positive linear operators
(1995)
Let Z be a Banach lattice endowed with positive cone C and an order-continuous norm ||.||. Let G be a semigroup of positive linear endomorphisms of Z...
Nested signature blocks
(University of Hertfordshire, 1995)
For any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as ...
Key-spoofing attacks on nested signature blocks
(1995)
For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ...
File server architecture for an open distributed document system
(University of Hertfordshire, 1994)
In this paper we will investigate design and implementation strategies for a file server in an open distributed document system. The aim of the open distributed document system is to provide and environment where a group ...
To whom am I speaking? Remote booting in a hostile world
(University of Hertfordshire, 1994)
We consider the problem of booting a workstation across a network. We allow "maintenance" (that is, change without notice by untrusted parties such as adversaries and system managers) to be freely performed upon the network, ...
Reverse accumulation and attractive fixed points
(1994)
We apply reverse accumulation to obtain automatic gradients and error estimates of functions which include in their computation a convergent iteration of the form y= Φ(y,u), where y and u are vectors. We suggest an ...
Self authenticating proxies
(University of Hertfordshire, 1994)
Authentication and access control are usually implemented as two separate protection mechanisms because they are logically separate functions. A consistent approach to both of these functions is proposed in this paper. In ...
Shrink-wrapped optimism: the DODA approach to distributed document processing
(University of Hertfordshire, 1994)
In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ...