Trust Management systems are trust infrastructures that support
authorization for security-critical actions in decentralized
environments. We investigate extension
suitable for multi-domain applications in variable-threat environments
that allow for temporary adjustments of trust
levels in response to elevated threat levels, and which can be
reversed without compromising actions that took place during
such periods—we term this, rollback-access. We argue
that a rollback-access capability is an essential feature for
security-critical applications, and propose a working prototype
for an agent based implementation.
Publications
- Hu, J., & Burmester, M. Establishing a PKI in an Open Adversarial Environment. In 9th IEEE International Conference on
Networking, Architecture, and Storage (NAS) (pp. 73-77). Tianjin, China, 2013.
- Jenkins, J., Easton, S., Guidry, D., Burmester, M., Liu, X., Yuan, S., Laurence, J., & Ty, S. Trusted Group Key Management
For Real-Time Critical Infrastructure Protection. In 32nd annual Military Communications Conference, MILCOM 2013 (pp. 6). IEEE
Communication Society, 2013.
- Burmester, M. A Trusted Computing Architecture for Critical Infrastructure Protection. In Nikolaos Bourbakis, George A.
Tsihrintzis, Maria Virvou, & Despina Kavraki (Eds.), Fourth International Conference on Information, Intelligence, Systems and
Applications (IISA 2013) (pp. 1-6). Piraeus - Athens, 2013.
- Burmester, M., Magkos, E., & Chrissikopulos, V. T-ABAC: An Attribute-Based Access Control Model for Real-Time Availability
in Highly Dynamic Systems. In Ivina Brandic, Stipe Celar, Hrvoje Dujmic, & Tajana Simunic Rosing (Eds.), Eighth IEEE Symposium on
Computers and Communications (ISCC'13) (pp. 6). Split, Croatia, IEEE, 2013.
- Burmester, M. Trusted Computing. In James Clark, Rebecca Wright, Julie Grady, Aljosa Pasic, Siani R Pearson, & Keyun Ruan
(Eds.), DIMAC/BIC/A4Cloud/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC) (pp. 6).
Malaga, Spain, DIMACS, 2013.
- Burmester, M., Laurence, J., Guidry, D., Easton, S., Ty, S., Liu, X., Yan, X., and Jenkins, J. Towards a Secure Electricity
Grid. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) (pp. 6).
Melbourne, Australia, 2013.
- Jenkins, J. and Burmester, M. (2013). Trusted Computing for Critical Infrastructure Protection Against Real-time and Run-time
Threats. In Jonathan Butts, & Sujeet Shenoi (Eds.), Seventh Annual IFIP WG 11.10 International Conference on Critical
Infrastructure Protection (pp. 12), Washington, DC, IFIP 2013.
- Kotzanikolaou, P., Avramidis, A., Douligeris, C., and Burmester, M. Chord-PKI: A distributed trust infrastructure based on
P2P networks. Computer Networks, 56(1), 378-398, 2012.
- Burmester, M. Trust Models for Ubiquitous Mobile Systems. In Humphry Hung, Y H Wong, & Vincent Cho (Eds.), Ubiquitous
Commerce for Creating the Personalized Marketplace: Concepts for Next Generation Adoption (pp. 249-254). Idea Group Inc, Hershey,
PA, 2009.
- Hu, J. and Burmester, M. Cooperation in Mobile Ad Hoc Networks. In Sudip Misra, Isaac Wounsang, & Subhas Misra (Eds.),
Guide to Wireless Ad Hoc Networks (pp. 43-58). London, Springer-Verlag, 2009.
- Mike Burmester, Prasanta Das, Martin Edwards and Alec Yasinsac. `Multi-Domain trust managerment in variable threat environments using rollback-access'. Military Communications
Conference, 2008 (MILCOM 2008), IEEE, San Diego, November 17-19, 2008.
- Mike Burmester and Yvo Desmedt. `Hierarchical Public-Key Certification: The Next Target for Hackers?'
Communications of the ACM, 47(8), pp. 86--74, August 2004.
- Yvo Desmedt and Mike Burmester. `Identity Based Key Infrastructures'.
Proceedings of the IFIP World Computer Congress (WCC2004-SEC), Toulouse, France, August 22-27, 2004.
- Mike Burmester, Yvo Desmedt and Yongue Wang. `A critical analysis of models for fault-tolerant and secure communication'. Communication, Network and Information Security 2003, Dec
10-12, New York, pp.147-152, 2003.
- Yvo Desmedt, Mike Burmester and Yongue Wang. `Using economics to model threats and security in distributed computing',
Extended Abstract. Workshop on Economics and Information Security,
University of California, Berkeley, May 16-17, 2002.
- Mike Burmester and Yvo Desmedt, `Secure Communication in an Unknown Network Using Certificates',
Advances in Cryptology - Asiacrypt '99, Lecture Notes in Computer Science 1716,
Springer, Berlin, pp. 274--287, 1999.
- Mike Burmester, Yvo Desmedt, Yonggue Wang, `Using Approximation Hardness to Achieve Dependable Computation',
Randomization and Approximation Techniques in Computer Science, Lecture
Notes in Computer Science 1518, Springer, Berlin, pp. 172--186, 1998.
- Mike Burmester and Yvo Desmedt, `Secure Communication in an Unknown Network with Byzantine Faults',
Electronics Letters, Vol 34(8), pp.~741--742, 1998.
- Mike Burmester, Yvo Desmedt and Gregori Kabatianski, `Trust and Security: A New Look at the Byzantine Generals Problem',
Proceedings of the DIMACS Workshop on Network Threats,
December 1996, R.R. Wright, P. Neuman (Eds.), American Mathematical Society, DIMACS Series, 1997.
|
|
|