In an open distributed system, resources must be shared among various users. Security is one of the major issues in designing such a system. When a computer system is connected to a network, it is very important to ensure that the computer has the ability to manage its local resources securely. In this position paper, we will demonstrate that current computer architectures do give malicious users ways to penetrate computer systems and hence access the system or other user's secrets which are supposed to be well protected. We also propose some possible solutions to counterattack such security threats either at hardware or software level. The impacts of such mechanisms to system hardware and software are also discussed
National Security Agency Although public awareness of the need for security in computing systems is ...
For over 30 years, system software has been bound by com-patibility with legacy applications. The sy...
Computer security has been an increasing concern for IT professionals for a number of years, yet des...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Andrew is a distributed computing environment that is a synthesis of the personal computing and time...
In the modern multi-user computer environment, Internet-capable network servers provide connectivity...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
We rely on various communications and software systems where security is critical. Many of these sys...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
Millions of people all over the world are now connected to the Internet for doing business. Therefor...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
National Security Agency Although public awareness of the need for security in computing systems is ...
For over 30 years, system software has been bound by com-patibility with legacy applications. The sy...
Computer security has been an increasing concern for IT professionals for a number of years, yet des...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Andrew is a distributed computing environment that is a synthesis of the personal computing and time...
In the modern multi-user computer environment, Internet-capable network servers provide connectivity...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Hardware and software do not operate in isolation. Neither should they be regarded as such when secu...
In this paper, we present THINK, our distributed systems architecture, and the research we have cond...
We rely on various communications and software systems where security is critical. Many of these sys...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
Millions of people all over the world are now connected to the Internet for doing business. Therefor...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
National Security Agency Although public awareness of the need for security in computing systems is ...
For over 30 years, system software has been bound by com-patibility with legacy applications. The sy...
Computer security has been an increasing concern for IT professionals for a number of years, yet des...