Skip to main content

Broadening the Scope of Fault Tolerance within Secure Services

  • Conference paper
  • First Online:
Book cover Security Protocols (Security Protocols 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2133))

Included in the following conference series:

  • 328 Accesses

Abstract

We believe that to date the use of fault tolerance within secure services has been limited to the scope of replicating services. We demonstrate that controlling state within a protocol execution can be a useful abstraction of fault tolerance within a secure environment, and this can lead to more widespread use of fault tolerance within secure services.

An early version of part of this paper is contained in my PhD dissertation [14].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Peter A. Alsberg and John D. Day. A principle for resilient sharing of distributed resources. In Proceedings of the 12 th International Conference on Software Engineering, pages 562–570, October 1976.

    Google Scholar 

  2. T. Anderson and P.A. Lee. Fault Tolerance: Principles and Practice. Prentice-Hall International, 1981.

    Google Scholar 

  3. T. Anderson and P.A. Lee. Fault tolerance terminology proposals. Technical Report 174, University of Newcastle upon Tyne, Computing Laboratory, University of Newcastle upon Tyne, Computing Laboratory, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England., April 1982.

    Google Scholar 

  4. T. Anderson, P.A. Lee, and S.K. Shrivastava. System Fault Tolerance, chapter 5, pages 153–210. Cambridge University Press, 1979.

    Google Scholar 

  5. M. Burrows, M. Abadi, and R.M. Needham. A logic of authentication. Proceedings of the Royal Society of London, 246:233–271, 1989.

    MathSciNet  Google Scholar 

  6. Navin Budhiraja, Keith Marzullo, Fred B Schneider, and Sam Toueg. Distributed Systems, chapter 8, pages 199–216. Addison-Wesley, 1993. 2 nd Edition.

    Google Scholar 

  7. David Chaum. Blind signatures for untraceable payments. In Proceedings of Crypto’ 82, pages 199–203, 1982.

    Google Scholar 

  8. Virgil D. Gligor. On denial-of-service in computer networks. In Proceedings of the International Conference on Data Engineering, pages 608–617, February 1986.

    Google Scholar 

  9. J. N. Gray. Notes on Data Base Operating Systems, volume 60 of Lecture Notes in Computer Science, chapter 3.F, pages 393–481. Springer-Verlag, 1978.

    Google Scholar 

  10. Catherine Meadows. The need for a failure model for security. In Proceedings of the 4 th International Workshop Conference on Dependable Computing for Critical Applications, 1994.

    Google Scholar 

  11. Catherine Meadows. Applying the dependability paradigm to computer security. In Proceedings of the 1995 New Security Paradigms Workshop, 1995.

    Google Scholar 

  12. Roger M. Needham. Denial of service: An example. Communications of the A.C.M., 37(11):42–46, November 1994.

    Google Scholar 

  13. Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the A.C.M., 21(12):993–999, December 1978.

    Google Scholar 

  14. Geraint Price. The interaction between fault tolerance and security. Technical Report No. 479, University of Cambridge, Computer Laboratory, December 1999.

    Google Scholar 

  15. Michael K. Reiter. The rampart toolkit for building high-integrity services. In K. P. Birman, F. Mattern, and A. Schiper, editors, International Workshop on Theory and Practice in Distributed Systems, volume 938 of Lecture Notes in Computer Science, pages 99–110, September 1994.

    Google Scholar 

  16. Michael K. Reiter. Secure agreement protocols: Reliable and atomic group multicast in rampart. In Proceedings of the 2 nd A.C.M. Conference on Computer and Communications Security, pages 68–80, November 1994.

    Google Scholar 

  17. Michael K. Reiter. Distributing trust with the rampart toolkit. Communications of the A.C.M., 39(4):71–74, April1996.

    Google Scholar 

  18. Fred B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. A.C.M. Computing Surveys, 22(4):299–319, December 1990.

    Google Scholar 

  19. Paul F. Syverson. A different look at secure distributed computation. In Proceedings of the 10 th I.E.E.E. Computer Security Foundations Workshop, pages 109–115, June1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Price, G. (2001). Broadening the Scope of Fault Tolerance within Secure Services. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-44810-1_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42566-3

  • Online ISBN: 978-3-540-44810-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics