首页 > 最新文献

1982 IEEE Symposium on Security and Privacy最新文献

英文 中文
A Software Protection Scheme 软件保护方案
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10012
G. Purdy, G. J. Simmons, James Studier
We discuss a technological means of protecting software from unauthorized duplication and use, which does not at the same time limit its sale or distribution on rely on a trusted authority.
我们讨论了一种保护软件免受未经授权的复制和使用的技术手段,同时不限制其依赖于可信权威的销售或分发。
{"title":"A Software Protection Scheme","authors":"G. Purdy, G. J. Simmons, James Studier","doi":"10.1109/SP.1982.10012","DOIUrl":"https://doi.org/10.1109/SP.1982.10012","url":null,"abstract":"We discuss a technological means of protecting software from unauthorized duplication and use, which does not at the same time limit its sale or distribution on rely on a trusted authority.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication 池化、分裂和恢复信息以克服某些通信渠道的完全失败
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10019
C. Asmuth, G. Blakley
This paper solves an analog of the problem which gave rise to the theory of error control codes by methods, of miniscule computational complexity, taken from the theory of TIPS (also called key safeguarding schemes, threshold schemes, secret sharing, key sharing, and IPS). The problem solved herein is the following. Information is flowing through several parallel channels from a sending node S to a receiving node R. The possibility exists that one or more channels will be rendered inoperative, but it is deemed essential that all the information get through. Suppose that the organization responsible for the information flow wants to protect Itself against ths breakdown of some of the total number d of available channels. It thus wants to be able to use "coding" and "decoding" processes, which are quick to implement on cheap microprocessors, for blending all the information H due to leave S into a slurry which can be poured into the d channels in such a way that whatever comes out of any b channels at R is enough to reconstruct H completely. It wants more than a high speed implementation of this process on cheap hardware. It wants to send as few bits as possible. Suppose, for example, that it has 100 bits to send and that it requires assurance that they will all get through even if 3 channels fail. It cannot predict which 3 channels might fail and it knows, of course, that it cannot reconstruct the 100 bits to be sent from S unless 100 bits get through the channels which continue to function (total bit cost: 100 plus the number of bits sent on channels which fail). Each of the following solutions to its problem is therefore optimal from an information theoretic viewpoint: 1. A way to reconstruct H from l-bit transmissionson any 100 of 103 channels (involves 3 wasted bits); 2. A way to reconstruct H from 10-bit transmissions on any 10 of 13 channels (involves 30 wasted bits); 3. A way to reconstruct H from 25-bit transmissions on any 4 of 7 channels (involves 75 wasted bits); 4. A way to reconstruct H from 100-bit transmissions on any 1 of 4 (involves 300 wasted bits). Common sense is inclined to reject at least the first (too many channels used) and last (too many bits sent) of the "optimal" solutions above. This paper shows how to produce cheap high speed processes which come within a hair of being optimal (in the sense just described) solutions to the problem in question. It describes parameter settings in which the problem cannot be solved satisfactorilyby at leastsome approaches. It discusses ways to decide on which "optimal" solution to the problem is preferable. The idea behind the theory presented here was originally to provide insurance against lose of information due to long-term outage of several channels of communication. The insurance turned out to be cheap (involving only general-purpose processor and memory chips) and compatible with communications in the megabit per second range. But the process involved conferred an unlooked-for add
本文从TIPS(也称为密钥保护方案、阈值方案、秘密共享、密钥共享和IPS)理论出发,采用计算复杂度极小的方法,模拟了错误控制码理论的产生。这里解决的问题如下。信息通过几个并行通道从发送节点S流向接收节点r。存在一个或多个通道失效的可能性,但所有信息都必须通过。假设负责信息流的组织希望保护自己不受可用通道总数d中的某些故障的影响。因此,它希望能够使用“编码”和“解码”过程,这些过程可以在廉价的微处理器上快速实现,用于混合由于离开S而产生的所有信息H,这些信息H可以倒入d通道中,以这样的方式,无论从R的任何b通道中产生什么都足以完全重建H。它想要的不仅仅是在廉价硬件上高速实现这个过程。它想要发送尽可能少的比特。例如,假设它有100位要发送,并且它需要确保即使3个通道失败也能全部通过。它无法预测哪3个通道可能会失败,当然,它知道它无法重建从S发送的100位,除非100位通过继续工作的通道(总比特成本:100加上在失败的通道上发送的比特数)。因此,从信息论的观点来看,以下每一种解决方案都是最优的:一种在103个通道中的任意100个通道中从l位传输重构H的方法(涉及3个浪费位);2. 一种从13个信道中的任意10个信道的10位传输中重构H的方法(涉及30个浪费的比特);3.。一种在7个信道中的任意4个信道上从25位传输重构H的方法(涉及75个浪费的比特);4. 一种从100位传输中重构H的方法(涉及300个浪费的比特)。常识倾向于至少拒绝上述“最佳”解决方案的第一个(使用了太多通道)和最后一个(发送了太多比特)。本文展示了如何生产廉价的高速工艺,这是最优(在刚刚描述的意义上)解决问题的方法。它描述了至少通过某些方法不能令人满意地解决问题的参数设置。它讨论了决定问题的“最优”解决方案是可取的方法。这里提出的理论背后的想法最初是为了提供保险,防止由于几个通信渠道的长期中断而导致的信息丢失。事实证明,这种保险很便宜(只涉及通用处理器和存储芯片),并且与每秒兆位的通信兼容。但这个过程带来了意想不到的额外好处。它为多路数字通信提供了一种新颖的方式,并在这样做的过程中,导致了各种数学上自然的“步进信息转换器”的发明(用于以各种低每秒比特率产生的几个数据流并将它们合并以产生在许多信道上以更高比特率传输的数据流的设备,在某些情况下,小于源数据流的数量)和“降压信息转换器”(在超过源数量的多个通道上,以较低的每秒比特传输速率传输几个每秒高比特率数据源的设备,从而使高速率流在接收器单独出现)。因此,提供可靠性的设备有时也能给通信系统带来经济效益。很明显,有一种自然的方法可以级联下面描述的过程。这种级联操作使得使用两个或三个微处理器来克服单个微处理器的固有限制成为可能。当一个比特率是另一个比特率的30倍以上时,单个32位微处理器无法处理两个比特流。但是双芯片级联可以处理比特率相差数百倍的比特流。三个芯片级联可以处理更多不同的比特流。最后,同样的理论似乎可以用于在分组交换网络中提供低成本可靠性,其中分组可能在碰撞中被破坏,并且可以用于芯片设计以提供容错性。
{"title":"Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication","authors":"C. Asmuth, G. Blakley","doi":"10.1109/SP.1982.10019","DOIUrl":"https://doi.org/10.1109/SP.1982.10019","url":null,"abstract":"This paper solves an analog of the problem which gave rise to the theory of error control codes by methods, of miniscule computational complexity, taken from the theory of TIPS (also called key safeguarding schemes, threshold schemes, secret sharing, key sharing, and IPS). The problem solved herein is the following. Information is flowing through several parallel channels from a sending node S to a receiving node R. The possibility exists that one or more channels will be rendered inoperative, but it is deemed essential that all the information get through. Suppose that the organization responsible for the information flow wants to protect Itself against ths breakdown of some of the total number d of available channels. It thus wants to be able to use \"coding\" and \"decoding\" processes, which are quick to implement on cheap microprocessors, for blending all the information H due to leave S into a slurry which can be poured into the d channels in such a way that whatever comes out of any b channels at R is enough to reconstruct H completely. It wants more than a high speed implementation of this process on cheap hardware. It wants to send as few bits as possible. Suppose, for example, that it has 100 bits to send and that it requires assurance that they will all get through even if 3 channels fail. It cannot predict which 3 channels might fail and it knows, of course, that it cannot reconstruct the 100 bits to be sent from S unless 100 bits get through the channels which continue to function (total bit cost: 100 plus the number of bits sent on channels which fail). Each of the following solutions to its problem is therefore optimal from an information theoretic viewpoint: 1. A way to reconstruct H from l-bit transmissionson any 100 of 103 channels (involves 3 wasted bits); 2. A way to reconstruct H from 10-bit transmissions on any 10 of 13 channels (involves 30 wasted bits); 3. A way to reconstruct H from 25-bit transmissions on any 4 of 7 channels (involves 75 wasted bits); 4. A way to reconstruct H from 100-bit transmissions on any 1 of 4 (involves 300 wasted bits). Common sense is inclined to reject at least the first (too many channels used) and last (too many bits sent) of the \"optimal\" solutions above. This paper shows how to produce cheap high speed processes which come within a hair of being optimal (in the sense just described) solutions to the problem in question. It describes parameter settings in which the problem cannot be solved satisfactorilyby at leastsome approaches. It discusses ways to decide on which \"optimal\" solution to the problem is preferable. The idea behind the theory presented here was originally to provide insurance against lose of information due to long-term outage of several channels of communication. The insurance turned out to be cheap (involving only general-purpose processor and memory chips) and compatible with communications in the megabit per second range. But the process involved conferred an unlooked-for add","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Forward Search as a Cryptanalytic Tool Against a Public Key 前向搜索作为针对公钥的密码分析工具
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10011
G. J. Simmons, D. Holdridge
In symmetric cryptosystems that depend on a single (secret) key for both encryption and decryption, a cryptanalyst -- since the key is unknown to him -- must either work backward from the cipher or else from the cipher and some known pairs of plain-text messages and matching ciphers in attempting to recover the plaintext. In an asymmetric (two key) cryptosystem used in the public key, i.e., privacy channel, mode where the encryption key is publicly expcxsedso that anyone who wishes can encrypt messages that can mly be decrypted by the person having the (secret) decryption key, a cryptanalytic weakness may occur that has no counterpart in symmetric systems. If the entropy of the input messages is too small (roughly speaking if it is computationally feasible to search through the most likely messages) either because the total number of messages is small or because a small number of the messages occur with high probabilities, the cryptanalyst can pre-encrypt these messages to form a cipher file that can then be matched against observed ciphers to accomplish a simple substitution decryption. This forward search cryptanalytic weakness of a public key privacy channel is purely a function of the entropy of the plaintext messages and does not depend on the existence of any cryptanalytic weakness in the concealment of the secret decryption key from a knowledge of the public encryption key in the underlying public key algorithm.
在依赖于单个(秘密)密钥进行加密和解密的对称密码系统中,密码分析人员(因为密钥对他来说是未知的)必须从密码中反向工作,或者从密码和一些已知的明文消息对和匹配的密码中尝试恢复明文。在公钥(即隐私通道)模式中使用的非对称(双密钥)密码系统中,加密密钥是公开的,因此任何希望加密的人都可以加密消息,这些消息可以由拥有(秘密)解密密钥的人解密,这可能会出现在对称系统中没有对应的密码分析弱点。如果输入消息的熵太小(粗略地说,如果搜索最有可能的消息在计算上是可行的),或者因为消息的总数很小,或者因为少数消息以高概率出现,密码分析人员可以对这些消息进行预加密,形成一个密码文件,然后与观察到的密码进行匹配,以完成简单的替换解密。公钥隐私通道的前向搜索密码分析弱点纯粹是明文消息熵的函数,并且不依赖于在底层公钥算法中对公共加密密钥的知识隐藏秘密解密密钥时存在任何密码分析弱点。
{"title":"Forward Search as a Cryptanalytic Tool Against a Public Key","authors":"G. J. Simmons, D. Holdridge","doi":"10.1109/SP.1982.10011","DOIUrl":"https://doi.org/10.1109/SP.1982.10011","url":null,"abstract":"In symmetric cryptosystems that depend on a single (secret) key for both encryption and decryption, a cryptanalyst -- since the key is unknown to him -- must either work backward from the cipher or else from the cipher and some known pairs of plain-text messages and matching ciphers in attempting to recover the plaintext. In an asymmetric (two key) cryptosystem used in the public key, i.e., privacy channel, mode where the encryption key is publicly expcxsedso that anyone who wishes can encrypt messages that can mly be decrypted by the person having the (secret) decryption key, a cryptanalytic weakness may occur that has no counterpart in symmetric systems. If the entropy of the input messages is too small (roughly speaking if it is computationally feasible to search through the most likely messages) either because the total number of messages is small or because a small number of the messages occur with high probabilities, the cryptanalyst can pre-encrypt these messages to form a cipher file that can then be matched against observed ciphers to accomplish a simple substitution decryption. This forward search cryptanalytic weakness of a public key privacy channel is purely a function of the entropy of the plaintext messages and does not depend on the existence of any cryptanalytic weakness in the concealment of the secret decryption key from a knowledge of the public encryption key in the underlying public key algorithm.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Practical Executive for Secure Communications 安全通信的实用执行器
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10013
G. Grossman
Computer communication is now used in many endeavors in which security and privacy are important, both in government and in the private sector. To support the need for secure computer communication, Digital Technology Incorporated (DTI) has developed the Secure HUB** Executive (HUB), e verified secure operating system oriented toward supporting communications and other real-time applications. The Secure HUB Executive currently runs on Digital Equipment Corporation PDP-11 and VAX-11 hardware, but it is portable to a wide range of mini- and microcomputers.
计算机通信现在被用于许多安全和隐私都很重要的努力中,无论是在政府部门还是在私营部门。为了支持安全计算机通信的需求,数字技术公司(DTI)开发了secure HUB** Executive (HUB),这是一个经过验证的安全操作系统,旨在支持通信和其他实时应用。安全HUB执行器目前运行在数字设备公司的PDP-11和VAX-11硬件上,但它可移植到各种小型和微型计算机上。
{"title":"A Practical Executive for Secure Communications","authors":"G. Grossman","doi":"10.1109/SP.1982.10013","DOIUrl":"https://doi.org/10.1109/SP.1982.10013","url":null,"abstract":"Computer communication is now used in many endeavors in which security and privacy are important, both in government and in the private sector. To support the need for secure computer communication, Digital Technology Incorporated (DTI) has developed the Secure HUB** Executive (HUB), e verified secure operating system oriented toward supporting communications and other real-time applications. The Secure HUB Executive currently runs on Digital Equipment Corporation PDP-11 and VAX-11 hardware, but it is portable to a wide range of mini- and microcomputers.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121574602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Shared Database Access using Composed Encryption Functions 使用组合加密功能的共享数据库访问
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10009
N. R. Wagner
This article presents a two-stage encryption method for sharing access to a database where no single agency or device can ever encrypt or decrypt the data directly. Thus an attack by an opponent would have to succeed at two separate points. The main tool needed is a secure cryptosystem closed under composition: encrypting and re-encrypting using two successive keys is equivalent to a single encryption using some third key. An example cryptosystem satisfying this condition is exponentiation modulo a fixed prime.
本文介绍了一种两阶段加密方法,用于共享对数据库的访问,在这种情况下,没有任何单个机构或设备可以直接加密或解密数据。因此,对手的进攻必须在两个不同的点上取得成功。所需的主要工具是在组合下封闭的安全密码系统:使用两个连续密钥进行加密和重新加密相当于使用第三个密钥进行单个加密。满足这个条件的一个例子是对一个固定素数取幂模。
{"title":"Shared Database Access using Composed Encryption Functions","authors":"N. R. Wagner","doi":"10.1109/SP.1982.10009","DOIUrl":"https://doi.org/10.1109/SP.1982.10009","url":null,"abstract":"This article presents a two-stage encryption method for sharing access to a database where no single agency or device can ever encrypt or decrypt the data directly. Thus an attack by an opponent would have to succeed at two separate points. The main tool needed is a secure cryptosystem closed under composition: encrypting and re-encrypting using two successive keys is equivalent to a single encryption using some third key. An example cryptosystem satisfying this condition is exponentiation modulo a fixed prime.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121602323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences OSKAR操作系统中的保护:目标、概念和后果
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10005
K. Dittrich, Karlheinz Hug, P. Kammerer, Dieter Lienert, Hans Mau, K. Wachsmuth
Present protection mechanisms in operating Systems are usually dedicated to provide reliability within the operating system. This paper presents a design that can be used to solve basic information protection problems by means of the operating system as well. It is based on a uniform system structuring unit, called a subsystem, and allows rather fine grain protection strategies to be reallzed. Further differences to other approaches lie in the notion of subject used and in the very detailed form privileges can be granted. The paper introduces the basic concepts, sketches on some implementation aspects and discusses the consequences of the approach. The ideas are currently implemented as part of the OSKAR operating system project.
当前操作系统中的保护机制通常致力于提供操作系统内部的可靠性。本文提出了一种利用操作系统解决基本信息保护问题的设计方案。它基于一个统一的系统结构单元,称为子系统,并允许实现相当细粒度的保护策略。与其他方法的进一步区别在于所使用的主题的概念以及可以授予特权的非常详细的形式。本文介绍了该方法的基本概念,概述了该方法的一些实施方面,并讨论了该方法的效果。这些想法目前作为OSKAR操作系统项目的一部分实现。
{"title":"Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences","authors":"K. Dittrich, Karlheinz Hug, P. Kammerer, Dieter Lienert, Hans Mau, K. Wachsmuth","doi":"10.1109/SP.1982.10005","DOIUrl":"https://doi.org/10.1109/SP.1982.10005","url":null,"abstract":"Present protection mechanisms in operating Systems are usually dedicated to provide reliability within the operating system. This paper presents a design that can be used to solve basic information protection problems by means of the operating system as well. It is based on a uniform system structuring unit, called a subsystem, and allows rather fine grain protection strategies to be reallzed. Further differences to other approaches lie in the notion of subject used and in the very detailed form privileges can be granted. The paper introduces the basic concepts, sketches on some implementation aspects and discusses the consequences of the approach. The ideas are currently implemented as part of the OSKAR operating system project.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121471029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Memoryless Inference Controls for Statistical Databases 统计数据库的无内存推理控制
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10016
D. Denning, J. Schlörer, Elisabeth Wehrle
Statistical databases aim to provide frequencies, averages, and other statistics about groups of persons (or organizations), while protecting the confidentiality of the individuals represented in the database. This objective is difficult to achieve, as users of statistical databases have a host of inference techniques at their disposal for retrieving information about identifiable persons (e.g., see [36,15,16,14,17,26, 31].) There are two broad categories of inference controls: controls that place restrictions on the set of allowable statistics, and controls that add noise to the data or to the released statistics. This paper focuses on restriction techniques.
统计数据库的目的是提供频率、平均值和关于一组人(或组织)的其他统计数据,同时保护数据库中所代表的个人的机密性。这一目标很难实现,因为统计数据库的用户有大量的推断技术可供他们使用,以检索有关可识别的人的信息(例如,参见[36,15,16,14,17,26,31])。推断控件有两大类:对允许的统计数据集施加限制的控件,以及向数据或已发布的统计数据添加噪声的控件。本文的重点是限制技术。
{"title":"Memoryless Inference Controls for Statistical Databases","authors":"D. Denning, J. Schlörer, Elisabeth Wehrle","doi":"10.1109/SP.1982.10016","DOIUrl":"https://doi.org/10.1109/SP.1982.10016","url":null,"abstract":"Statistical databases aim to provide frequencies, averages, and other statistics about groups of persons (or organizations), while protecting the confidentiality of the individuals represented in the database. This objective is difficult to achieve, as users of statistical databases have a host of inference techniques at their disposal for retrieving information about identifiable persons (e.g., see [36,15,16,14,17,26, 31].) There are two broad categories of inference controls: controls that place restrictions on the set of allowable statistics, and controls that add noise to the data or to the released statistics. This paper focuses on restriction techniques.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116488356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances 被蒙住眼睛的仲裁员无法组成联盟的数字签名
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10010
S. Akl
A brief comparative analysis of existing true and arbitrated digital signatures is presented. A new scheme for obtaining signatures which is a hybrid of conventional and public-key cryptosystems - is then proposed and its properties discussed.
对现有的真实数字签名和仲裁数字签名进行了简要的比较分析。然后提出了一种新的签名获取方案,它是传统和公钥密码系统的混合方案,并讨论了它的性质。
{"title":"Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances","authors":"S. Akl","doi":"10.1109/SP.1982.10010","DOIUrl":"https://doi.org/10.1109/SP.1982.10010","url":null,"abstract":"A brief comparative analysis of existing true and arbitrated digital signatures is presented. A new scheme for obtaining signatures which is a hybrid of conventional and public-key cryptosystems - is then proposed and its properties discussed.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127881939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cryptographic Relational Algebra 密码学关系代数
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10008
G. Davida, Y. Yeh
Data protection in computer systems is a rather complex problem. Data has to be protected while it is in memory, during communication and while it is stored on mass storage devices. During computation the central processor executes instructions and operates on data that are in readable form. The problem of operating on encrypted data was first considered by Rivest et al [4]. However, notrivial privacy homomorphisms do not exist. Thus it seems that isolation of users is the only alternative if security and privacy is to be achieved. However, in practice isolation is difficult to enforce. Worse, when user to user communication is allowed, more serious loopholes develop. Even though the problems of protection in Operating Systems in general are difficult, one does not have to settle for no security. Encryption allows the protection of data even when good security measures are lacking in an Operating System. In fact it is possible to design operating systems with improved protection using encryption [3]. In this paper we shall consider the problems of encrypted relational datsbases and show that it is possible under some circumstances to perform relational operations without decrypting an entire record.
计算机系统中的数据保护是一个相当复杂的问题。数据在内存中、通信过程中以及存储在大容量存储设备上时都必须受到保护。在计算过程中,中央处理器执行指令并对可读形式的数据进行操作。对加密数据进行操作的问题最早由Rivest等人提出[4]。然而,不存在重要的隐私同态。因此,如果要实现安全和隐私,隔离用户似乎是唯一的选择。然而,在实践中,隔离很难执行。更糟糕的是,当允许用户之间的通信时,更严重的漏洞就会出现。尽管操作系统中的保护问题通常是困难的,但人们不必满足于没有安全性。即使在操作系统缺乏良好的安全措施时,加密也可以保护数据。事实上,使用加密技术设计具有改进保护的操作系统是可能的[3]。在本文中,我们将考虑加密关系数据库的问题,并说明在某些情况下,不解密整个记录就可以执行关系操作。
{"title":"Cryptographic Relational Algebra","authors":"G. Davida, Y. Yeh","doi":"10.1109/SP.1982.10008","DOIUrl":"https://doi.org/10.1109/SP.1982.10008","url":null,"abstract":"Data protection in computer systems is a rather complex problem. Data has to be protected while it is in memory, during communication and while it is stored on mass storage devices. During computation the central processor executes instructions and operates on data that are in readable form. The problem of operating on encrypted data was first considered by Rivest et al [4]. However, notrivial privacy homomorphisms do not exist. Thus it seems that isolation of users is the only alternative if security and privacy is to be achieved. However, in practice isolation is difficult to enforce. Worse, when user to user communication is allowed, more serious loopholes develop. Even though the problems of protection in Operating Systems in general are difficult, one does not have to settle for no security. Encryption allows the protection of data even when good security measures are lacking in an Operating System. In fact it is possible to design operating systems with improved protection using encryption [3]. In this paper we shall consider the problems of encrypted relational datsbases and show that it is possible under some circumstances to perform relational operations without decrypting an entire record.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125475755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Specification-to-Code Correlation Specification-to-Code相关性
Pub Date : 1982-04-26 DOI: 10.1109/SP.1982.10006
J. Solomon
System Development Corporation (SDC) has developed an informal approach for establishing correspondence (or lack thereof) between the formal specifications of a system and lower levels of specification, including implementation code. Establishing correspondence means showing that one level meets the intent of a higher lever. This paper presents the motivation, technique, and current SDC experience with the method, contains an example of the hypothetical correlation analysis, and evaluates the limits and the usefulness of this approach. This paper results from recent applications of the method.
系统开发公司(SDC)已经开发了一种非正式的方法,用于在系统的正式规范和较低层次的规范(包括实现代码)之间建立对应关系(或缺乏对应关系)。建立对应关系意味着表明一个层次符合更高层次的意图。本文介绍了该方法的动机、技术和当前的SDC经验,包含一个假设相关分析的例子,并评估了该方法的局限性和有用性。本文是该方法最近应用的结果。
{"title":"Specification-to-Code Correlation","authors":"J. Solomon","doi":"10.1109/SP.1982.10006","DOIUrl":"https://doi.org/10.1109/SP.1982.10006","url":null,"abstract":"System Development Corporation (SDC) has developed an informal approach for establishing correspondence (or lack thereof) between the formal specifications of a system and lower levels of specification, including implementation code. Establishing correspondence means showing that one level meets the intent of a higher lever. This paper presents the motivation, technique, and current SDC experience with the method, contains an example of the hypothetical correlation analysis, and evaluates the limits and the usefulness of this approach. This paper results from recent applications of the method.","PeriodicalId":195978,"journal":{"name":"1982 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
1982 IEEE Symposium on Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1