Search For:

Displaying 1-10 out of 10 total
Secure Overlay Cloud Storage with Access Control and Assured Deletion
Found in: IEEE Transactions on Dependable and Secure Computing
By Yang Tang,Patrick P.C. Lee,John C.S. Lui,Radia Perlman
Issue Date:November 2012
pp. 903-916
We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement ...
 
File System Design with Assured Delete
Found in: Security in Storage Workshop, International IEEE
By Radia Perlman
Issue Date:December 2005
pp. 83-88
This paper describes a system that supports high availability of data, until the data should be expunged, at which time the system makes it impossible to recover the data. This design supports two types of assured delete; where the expiration time is known...
 
Analysis of the IPSec Key Exchange Standard
Found in: Enabling Technologies, IEEE International Workshops on
By Radia Perlman, Charlie Kaufman
Issue Date:June 2001
pp. 150
This paper describes the purpose, history, and analysis of IKE [RFC2409], the current standard for key exchange for the IPSec protocol. We discuss some issues with the rest of IPSec, such as what services it can offer without changing the applications, and...
 
Key Exchange in IPSec: Analysis of IKE
Found in: IEEE Internet Computing
By Radia Perlman, Charlie Kaufman
Issue Date:November 2000
pp. 50-56
<p>The IPSec protocol is a recently proposed standard of the IETF for securing real-time communications on the Internet. The authors explain how its key exchange mechanism (IKE) works and suggest improvements.</p>
 
Protocol design for effective communication among silicon or carbon-based nodes
Found in: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10)
By Radia Perlman
Issue Date:August 2010
pp. 112-ff
In this talk I will discuss some of the lessons I've discovered about network protocol design; how to make protocols self-stabilizing, how to make networks self-configuring, how to provide optional configuration in such a way that misconfiguration does no ...
     
Privacy-preserving DRM
Found in: Proceedings of the 9th Symposium on Identity and Trust on the Internet (IDTRUST '10)
By Charlie Kaufman, Radia Perlman, Ray Perlner
Issue Date:April 2010
pp. 69-83
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption. In add...
     
User-centric PKI
Found in: Proceedings of the 7th symposium on Identity and trust on the Internet (IDtrust '08)
By Charlie Kaufman, Radia Perlman
Issue Date:March 2008
pp. 34-38
The goal of supporting Single Sign-On to the Web has proven elusive. A number of solutions have been proposed -- and some have even been deployed -- but the capability remains unavailable to most users and the solutions deployed raise concerns for both con...
     
An algorithm for distributed computation of a spanningtree in an extended LAN
Found in: Proceedings of the ninth symposium on Data communications (SIGCOMM '85)
By Radia Perlman
Issue Date:September 1985
pp. 257-260
A protocol and algorithm are given in which bridges in an extended Local Area Network of arbitrary topology compute, in a distributed fashion, an acyclic spanning subset of the network.The algorithm converges in time proportional to the diameter of the ext...
     
Incorporation of multiaccess links into a routing protocol
Found in: Proceedings of the eigth Data Communications Symposium (SIGCOMM '83)
By Radia Perlman
Issue Date:October 1983
pp. 85-94
Conventional routing protocols and algorithms work most efficiently on sparsely connected networks. Network topologies today include multiaccess links which include hundreds of nodes, all of which are capable of direct communication with each other. Some o...
     
Incorporation of service classes into a network architecture
Found in: Proceedings of the seventh data communications symposium
By Radia Perlman
Issue Date:October 1981
pp. 204-210
This paper defines a service class and describes how a completely general service class structure can be provided by a packet switched network. It describes the difference between a handling directive and a routing metric, and defines a service class as an...
     
 1