Abstract
We believe that to date the use of fault tolerance within secure services has been limited to the scope of replicating services. We demonstrate that controlling state within a protocol execution can be a useful abstraction of fault tolerance within a secure environment, and this can lead to more widespread use of fault tolerance within secure services.
An early version of part of this paper is contained in my PhD dissertation [14].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Peter A. Alsberg and John D. Day. A principle for resilient sharing of distributed resources. In Proceedings of the 12 th International Conference on Software Engineering, pages 562–570, October 1976.
T. Anderson and P.A. Lee. Fault Tolerance: Principles and Practice. Prentice-Hall International, 1981.
T. Anderson and P.A. Lee. Fault tolerance terminology proposals. Technical Report 174, University of Newcastle upon Tyne, Computing Laboratory, University of Newcastle upon Tyne, Computing Laboratory, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England., April 1982.
T. Anderson, P.A. Lee, and S.K. Shrivastava. System Fault Tolerance, chapter 5, pages 153–210. Cambridge University Press, 1979.
M. Burrows, M. Abadi, and R.M. Needham. A logic of authentication. Proceedings of the Royal Society of London, 246:233–271, 1989.
Navin Budhiraja, Keith Marzullo, Fred B Schneider, and Sam Toueg. Distributed Systems, chapter 8, pages 199–216. Addison-Wesley, 1993. 2 nd Edition.
David Chaum. Blind signatures for untraceable payments. In Proceedings of Crypto’ 82, pages 199–203, 1982.
Virgil D. Gligor. On denial-of-service in computer networks. In Proceedings of the International Conference on Data Engineering, pages 608–617, February 1986.
J. N. Gray. Notes on Data Base Operating Systems, volume 60 of Lecture Notes in Computer Science, chapter 3.F, pages 393–481. Springer-Verlag, 1978.
Catherine Meadows. The need for a failure model for security. In Proceedings of the 4 th International Workshop Conference on Dependable Computing for Critical Applications, 1994.
Catherine Meadows. Applying the dependability paradigm to computer security. In Proceedings of the 1995 New Security Paradigms Workshop, 1995.
Roger M. Needham. Denial of service: An example. Communications of the A.C.M., 37(11):42–46, November 1994.
Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the A.C.M., 21(12):993–999, December 1978.
Geraint Price. The interaction between fault tolerance and security. Technical Report No. 479, University of Cambridge, Computer Laboratory, December 1999.
Michael K. Reiter. The rampart toolkit for building high-integrity services. In K. P. Birman, F. Mattern, and A. Schiper, editors, International Workshop on Theory and Practice in Distributed Systems, volume 938 of Lecture Notes in Computer Science, pages 99–110, September 1994.
Michael K. Reiter. Secure agreement protocols: Reliable and atomic group multicast in rampart. In Proceedings of the 2 nd A.C.M. Conference on Computer and Communications Security, pages 68–80, November 1994.
Michael K. Reiter. Distributing trust with the rampart toolkit. Communications of the A.C.M., 39(4):71–74, April1996.
Fred B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. A.C.M. Computing Surveys, 22(4):299–319, December 1990.
Paul F. Syverson. A different look at secure distributed computation. In Proceedings of the 10 th I.E.E.E. Computer Security Foundations Workshop, pages 109–115, June1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Price, G. (2001). Broadening the Scope of Fault Tolerance within Secure Services. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_20
Download citation
DOI: https://doi.org/10.1007/3-540-44810-1_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42566-3
Online ISBN: 978-3-540-44810-5
eBook Packages: Springer Book Archive