Intrusion-tolerant enclaves

被引:10
|
作者
Dutertre, B [1 ]
Crettaz, V [1 ]
Stavridou, V [1 ]
机构
[1] SRI Int, Syst Design Lab, Menlo Pk, CA 94025 USA
关键词
D O I
10.1109/SECPRI.2002.1004373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be able to penetrate the system. Intrusion tolerance attempts to maintain acceptable service despite such intrusions. This paper presents an application of intrusion-tolerance concepts to Enclaves, a software infrastructure for supporting secure group applications. Intrusion tolerance is achieved via a combination of Byzantine fault-tolerant protocols and secret sharing techniques.
引用
收藏
页码:216 / 224
页数:9
相关论文
共 50 条
  • [41] INSENS: Intrusion-tolerant routing for wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (02) : 216 - 230
  • [42] Designing and Implementing a Diversity Policy for Intrusion-Tolerant Systems
    Heo, Seondong
    Lee, Soojin
    Jang, Bumsoon
    Yoon, Hyunsoo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (01): : 118 - 129
  • [43] Intrusion-tolerant system design for web server survivability
    Choi, DS
    Im, EG
    Lee, CW
    [J]. INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 124 - 134
  • [44] Distributed group membership algorithm in intrusion-tolerant system
    Yin, LH
    Fang, BX
    Yu, XZ
    [J]. ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 511 - 515
  • [45] The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
    Saidane, Ayda
    Nicomette, Vincent
    Deswarte, Yves
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (01) : 45 - 58
  • [46] Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging
    Duan, Sisi
    Liu, Chao
    Wang, Xin
    Wu, Yusen
    Xu, Shuai
    Yesha, Yelena
    Zhang, Haibin
    [J]. 2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 319 - 328
  • [47] Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers
    Okamoto, Takeshi
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 2319 - 2327
  • [48] A performance evaluation of intrusion-tolerant routing in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    [J]. INFORMATION PROCESSING IN SENSOR NETWORKS, PROCEEDINGS, 2003, 2634 : 349 - 364
  • [49] A Scalable and Intrusion-tolerant Digital Time-stamping System
    Tulone, Daniela
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2357 - 2363
  • [50] Intrusion-Tolerant Broadcast and Agreement Abstractions in the Presence of Byzantine Processes
    Mostefaoui, Achour
    Raynal, Michel
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) : 1085 - 1098