The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Interoperability and Security Requirements for Use of the data Encryption Standard in the Physical Layer of Data Communications

National Communications System Office of Technology and Standards
Added 2002-07-26

History of Computer Security Project Early Papers (part I)

University if California, Davis
Added 2002-07-26

A Simple Active Attack Against TCP

Laurent Joncheray

This paper describes an active attack against the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection offered by such a system as a one-time password[SKEY] or by ticketing authentication [Kerberos]. The TCP COnnection is vulnerable to anyone with a TCP packet sniffer and generator locates on the path followed by the connection. Some schemes to detect this attack are presented as well as some methods of prevention and some interesting details of the TCP protocol behaviors.

Added 2002-07-26




A Bibliography on Performance Issues in ATM Networks

I. Nikolaidis,R.O. Onvural

The Asychronous Transfer Mode (ATM) is the transport mode of choice for B-ISDN. In order for high speed networks to become a reality, a number of performance issues has to be resolved.

Added 2002-07-26

An Overview of InterBase Systems

O. Bukhres,J. Chen,W. Du,A.K. Elmagarmid,R. Pezzoli

Distributed, heterogeneous, and autonomous hardware and software systems are the product of legnthy and diverse computational and information processing requirements. The introduction of harmonious cooperation among such systems carries the potential for great increases in productivity and improvment in applications processing. However, such harmonious cooperation must be supportedby an integrated system that would allow the developement of global applications.

Added 2002-07-26


Network Security Tools

S. Quinn
Added 2002-07-26

An Introduction to Software Architecture

D. Garlan,M. Shaw

As the size of system software increases, the algorithms and data structures of the computation no longer constitute the major design problems. When systema are constructed from many components, the organization of the overall system - the software architecture - presents a new set of dsign problems. This level of design has been address a number of ways including informal diagrams and descriptive terms, module interconnection languages, templates and frmeworks for systems that serve the needs of specific domains, and formal models of component integration mechanisms.

Added 2002-07-26

Task Communication in DEMOS

F. Baskett,J.H. Howard,J.T. Montague

This paper describes the fundamentals and some of the details of task commincation in DEMCS, the operating system for the CRAY-1 computer being developed at the Los Alamos Scientific Laboratory. The communication mech- anism is a message system with several novel features. Meesages are sent from one task to another over links. Links are the primary protected objects in the system; they provide messages paths and optional data sharing between tasks. They can be used to represent other objects with capability-like ac- cess controls. Links point to the tasks that created them. A task that creates a link determines its contents and possibly restricts its use. A link may be passed on from on task to another along with a message sent over some other link suject to the restrictions imposed by the creatorof the link be- ing passed. The link based message and sata sharing system is an attractive alternative to semaphore or monitor type shared variable based operating system on machines with only very simple memory protection mechanisms or on machines connected together in a network.

Added 2002-07-26

The DEMCS File System

M.L. Powell

This paper discussesthe design of the file system for DEMCS, an operating system being developed for the CRAY-1 somputer at Los Alamos Scientific Laboratory. The goals to be met, in particular the performance and usability considerations are outlined. A descriptionis given of the user interface and the general structure of the file systemand the file system routines. A simple model of program behavior is used to demonstrate the effet of buffer- ing data by the file system routines. A disk space allocation strategy is descibed which will take advantage of this buffering. The last section out- lines how the performance mechanisms are itegrated into the file system routines.

Added 2002-07-26

The Design and Implemntation of a Log-Structured File System

M. Rosenblum,J.K. Ousterhout
Added 2002-07-26

A High Performance Multi-Structured File System Design

K. Muller,J. Pasquale
Added 2002-07-26