首页 > 最新文献

1980 IEEE Symposium on Security and Privacy最新文献

英文 中文
The Trusted Function in Secure Decenralized Processing 安全去中心化处理中的可信功能
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10013
P. T. Withington
The information processors in a decentralized computing system must trust each other enough to be mutually supportive, yet they must also protect themselves to maintain autonomy. In a decentralized system, data security is especially important because the effects of compromise or sabotage can be so wide-ranging. The trusted function is an ad hoc solution to a problem with present data security models. This "consistency" problem, never previously addressed in a formal manner, is aggravated in the decentralized processing setting. The paper examines the consistency problem and proposes an addition to existing security models to address the problem. Using the model, the impact of the trusted function on secure, decentralized-processing system design is assessed.
分散计算系统中的信息处理器必须彼此足够信任以相互支持,但它们也必须保护自己以保持自主性。在分散的系统中,数据安全尤为重要,因为妥协或破坏的影响可能非常广泛。可信函数是针对当前数据安全模型问题的临时解决方案。这种以前从未以正式方式处理过的“一致性”问题在分散处理环境中更加严重。本文研究了一致性问题,并提出了对现有安全模型的补充来解决这个问题。利用该模型,评估了可信功能对安全、分散处理系统设计的影响。
{"title":"The Trusted Function in Secure Decenralized Processing","authors":"P. T. Withington","doi":"10.1109/SP.1980.10013","DOIUrl":"https://doi.org/10.1109/SP.1980.10013","url":null,"abstract":"The information processors in a decentralized computing system must trust each other enough to be mutually supportive, yet they must also protect themselves to maintain autonomy. In a decentralized system, data security is especially important because the effects of compromise or sabotage can be so wide-ranging. The trusted function is an ad hoc solution to a problem with present data security models. This \"consistency\" problem, never previously addressed in a formal manner, is aggravated in the decentralized processing setting. The paper examines the consistency problem and proposes an addition to existing security models to address the problem. Using the model, the impact of the trusted function on secure, decentralized-processing system design is assessed.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132417634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting Shared Cryptographic Keys 保护共享的加密密钥
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10011
G. Davida, R. DeMillo, R. Lipton
In this paper, we present a scheme for distributing a key to n users in such a way as to require at least k of them (k < n) to be present to construct the original key. The scheme has the property that up to k - 1 defections can be tolerated. It can be implemented simply and efficiently.
本文提出了一种将密钥分配给n个用户的方案,该方案要求至少有k个用户(k < n)在场才能构造原始密钥。该方案具有最多可容忍k - 1个缺陷的性质。它可以简单有效地实现。
{"title":"Protecting Shared Cryptographic Keys","authors":"G. Davida, R. DeMillo, R. Lipton","doi":"10.1109/SP.1980.10011","DOIUrl":"https://doi.org/10.1109/SP.1980.10011","url":null,"abstract":"In this paper, we present a scheme for distributing a key to n users in such a way as to require at least k of them (k < n) to be present to construct the original key. The scheme has the property that up to k - 1 defections can be tolerated. It can be implemented simply and efficiently.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116137120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
On Security Flow Analysis in Computer Systems (Preliminary Report) 计算机系统安全流分析(初步报告)
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10001
Lishing Liu
A formal model of multilevel security systems is presented. We examine weaknesses of current security flow analysis mechanisms. A concept of expression flows is introduced, which allows us to use various techniques to certify systems that cannot be certified using current flow analysis techniques. We provide a method for generating static authorization requirements for systems in which authorization functions are only partially specified. We also attack the problem of using dynamic authorization functions for system certification.
提出了多级安全系统的形式化模型。我们研究了当前安全流分析机制的弱点。介绍了表达式流的概念,它允许我们使用各种技术来认证不能使用当前流分析技术认证的系统。我们提供了一种方法,用于为仅部分指定授权功能的系统生成静态授权需求。我们还解决了使用动态授权功能进行系统认证的问题。
{"title":"On Security Flow Analysis in Computer Systems (Preliminary Report)","authors":"Lishing Liu","doi":"10.1109/SP.1980.10001","DOIUrl":"https://doi.org/10.1109/SP.1980.10001","url":null,"abstract":"A formal model of multilevel security systems is presented. We examine weaknesses of current security flow analysis mechanisms. A concept of expression flows is introduced, which allows us to use various techniques to certify systems that cannot be certified using current flow analysis techniques. We provide a method for generating static authorization requirements for systems in which authorization functions are only partially specified. We also attack the problem of using dynamic authorization functions for system certification.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120962002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure Communications in the Presence of Pervasive Deceit 存在普遍欺骗的安全通信
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10003
G. J. Simmons
The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable using either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.
保密、识别发送者和消息认证的功能,以及这些功能的组合,原则上都可以使用对称或非对称密码系统来实现。由于安全通信依赖于通信各方之间的经过身份验证的数据交换和/或经过身份验证的操作,因此开发了使用对称或非对称技术的身份验证基础。令人惊讶的结论是,它们只是在实现进一步安全通信所需的安全交换方面有所不同。根据这些发现讨论了对公钥目录进行身份验证的问题。
{"title":"Secure Communications in the Presence of Pervasive Deceit","authors":"G. J. Simmons","doi":"10.1109/SP.1980.10003","DOIUrl":"https://doi.org/10.1109/SP.1980.10003","url":null,"abstract":"The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable using either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125817877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Master Key Problem 万能钥匙问题
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10009
D. Denning, F. Schneider
Four methods for generating and distributing shared group encryption keys in a cryptographic system are described. All four methods can be used to implement secure broadcasts among groups of users in computer networks. Two methods use n secret keys to construct a master key for 2n -1 keys.
描述了在密码系统中生成和分发共享组加密密钥的四种方法。这四种方法都可以用于实现计算机网络中用户组之间的安全广播。有两种方法使用n个秘密密钥为2n个-1个密钥构造一个主密钥。
{"title":"The Master Key Problem","authors":"D. Denning, F. Schneider","doi":"10.1109/SP.1980.10009","DOIUrl":"https://doi.org/10.1109/SP.1980.10009","url":null,"abstract":"Four methods for generating and distributing shared group encryption keys in a cryptographic system are described. All four methods can be used to implement secure broadcasts among groups of users in computer networks. Two methods use n secret keys to construct a master key for 2n -1 keys.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protocols for Public Key Cryptosystems 公钥密码系统协议
Pub Date : 1980-04-14 DOI: 10.1109/SP.1980.10006
R. Merkle
New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving. Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.
新的密码协议充分利用了公钥密码系统的独特特性,正在不断发展。对几种用于公钥分发和数字签名的协议进行了简要的相互比较,并与传统的替代方案进行了比较。
{"title":"Protocols for Public Key Cryptosystems","authors":"R. Merkle","doi":"10.1109/SP.1980.10006","DOIUrl":"https://doi.org/10.1109/SP.1980.10006","url":null,"abstract":"New Cryptographic protocols which take full advantage of the unique properties of public key cryptosystems are now evolving. Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125735974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1454
The Cryptographic Security of Compact Knapsacks (Preliminary Report) 紧凑型背包的密码安全性(初步报告)
Pub Date : 1980-04-01 DOI: 10.1109/SP.1980.10005
A. Shamir
In 1978, Merkle and Hellman introduced a knapsack-based public-key cryptosystem, which received widespread attention. The two major open problems concerning this cryptosystem are: (i) Security: How difficult are the Merkle-Hellman knapsacks? (ii) Efficiency: Can the huge key size be reduced? In this paper we analyze the cryptographic security of knapsack problems with small keys, develop a new (non-enumerative)type of algorithm for solving them, and use the algorithm to show that under certain assumptions it is as difficult to find the hidden trapdoors in Merkle-Hellman knapsacks as it is to solve general knapsack problems.
1978年,Merkle和Hellman提出了一个基于背包的公钥密码系统,受到了广泛的关注。关于这个密码系统的两个主要开放问题是:(i)安全性:Merkle-Hellman背包有多困难?(ii)效率:能否减小庞大的密钥大小?本文分析了带有小密钥的背包问题的密码安全性,提出了一种新的(非枚举的)算法来解决这些问题,并利用该算法证明了在一定的假设下,找到Merkle-Hellman背包中隐藏的陷阱门与解决一般背包问题一样困难。
{"title":"The Cryptographic Security of Compact Knapsacks (Preliminary Report)","authors":"A. Shamir","doi":"10.1109/SP.1980.10005","DOIUrl":"https://doi.org/10.1109/SP.1980.10005","url":null,"abstract":"In 1978, Merkle and Hellman introduced a knapsack-based public-key cryptosystem, which received widespread attention. The two major open problems concerning this cryptosystem are: (i) Security: How difficult are the Merkle-Hellman knapsacks? (ii) Efficiency: Can the huge key size be reduced? In this paper we analyze the cryptographic security of knapsack problems with small keys, develop a new (non-enumerative)type of algorithm for solving them, and use the algorithm to show that under certain assumptions it is as difficult to find the hidden trapdoors in Merkle-Hellman knapsacks as it is to solve general knapsack problems.","PeriodicalId":372320,"journal":{"name":"1980 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
1980 IEEE Symposium on Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1