Advertisement

SECURE: A Simulation Tool for PKI Design

  • L. Romano
  • A. Mazzeo
  • N. Mazzocca
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1740)

Abstract

This work presents a novel methodology for security analysis of computer systems. The suggested approach, called simulated hazard injection, is a variant of simulated fault injection, which has already been employed with success to the design and evaluation of fault-tolerant computer systems. The paper describes the key ideas underlying the proposed methodology, and defines a portfolio of security measures to be extracted from experimental data. These concepts are incorporated in a tool for dependability analysis of Public Key Infrastructure (PKI) based systems. The tool is called SECURE and is currently under development at the University of Naples. The paper describes the architecture of the tool and discusses its potentialities.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ford, W., Baum, M. S.: Secure Electronic Commerce. Prentice Hall Inc., Upper Saddle River (1997)Google Scholar
  2. 2.
    Atkins, D. et al.: Internet Security Professional Reference. 2nd edn. New Riders Publishing, Indianapolis (1997)Google Scholar
  3. 3.
    Iyer, R. K., Tang, D.: Experimental Analysis of Computer Systems Dependability. In: Pradhan, D. K.: Fault-Tolerant Computer System Design. Prentice Hall Inc., Upper Saddle River (1996)Google Scholar
  4. 4.
    Saleh, R.A., Newton, A.R.: Mixed-Mode Simulation. Kluwer Academic Publishers (1990)Google Scholar
  5. 5.
    Obal II, W. D., Sanders, W. H.: An Environment for Importance Sampling Based on Stochastic Activity Networks. In: Proceedings of the 13th Symposium on Reliable Distributed Systems, Dana Point, CA (1994) 64–73Google Scholar
  6. 6.
    Kaancihe, M., Romano, L., Kalbarczyk, Z., Iyer, R. K., Karcich, R.: A Hierarchical Approach for Dependability Analysis of a Commercial Cached RAID Storage Architecture. In: Proccedings of The Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (FTCS28), IEEE-CS, Los Alamitos (1998) 6–15CrossRefGoogle Scholar
  7. 7.
    Goswami, K. K., Iyer, R. K., Young L.: DEPEND: A Simulation-Based Environment for System Level Dependability Analysis”. In: IEEE Transactions on Computers, Vol. 46, No. 1 (1997) 60–74CrossRefGoogle Scholar
  8. 8.
    Schwetman, H.: Using CSIM to model complex systems. In: Proceedings of the 1988 Winter Simulation Conference, ed. M. Abrams, P. Haigh, and J. Comfort, San Diego (1988) 246-253Google Scholar
  9. 9.
    CSIM18 User Guides (C++ version), http://www.mesquite.com/
  10. 10.
    PKIX Working Group: Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. INTERNET-DRAFT, April 1998Google Scholar
  11. 11.
    PKIX Working Group: An Internet Attribute Certificate Profile for Authorization. INTERNET-DRAFT, April 1999Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • L. Romano
    • 1
  • A. Mazzeo
    • 2
  • N. Mazzocca
    • 2
  1. 1.Università degli Studi di Napoli “Federico II”NapoliItaly
  2. 2.II Università degli Studi di NapoliAversa (CE)Italy

Personalised recommendations