• Authorization and access control in a distributed file repository 

      Arild, Ronny; Stabell-Kulø, Tage (Research report; Forskningsrapport, 1999-01-18)
      A distributed file repository is described. It supports interaction between different machines used by a single user, as well as between users that share data. Files can be replicated and consistency will be maintained, or files can be shipped (copied) to a remote site. As with more traditional systems, the servers are trusted not to leak information. However, the rôle servers play is not as much ...
    • File repository transfer protocol. Version 1 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1995-02)
      This document presents and specifies the protocol that interfaces clients and servers in the File Repository (FR). The FR is a software system that supports sharing of files. The protocol is modelled after Smtp and Nntp and is encoded in Ascii. No details of server implementation is visible in the protocol description, but we state our intentions at several occasions.
    • Pesto flavoured security 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2002-05)
      Pesto aims at providing highly available and secure storage for longlived data to mobile users roaming into untrusted environments. Security in Pesto encompasses the following three aspects: availability, safety, and privacy. A mechanism supporting one aspect may adversely affect another. For example, replication may increase availability but complicates supporting confidentiality, and simply ...
    • The Pesto project. Goals and motivation 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2001-06)
      Pesto is a storage system geared towards a computing model where private machines play a pivotal role. Sharing of data is crucial, both between partners, and between the many devices owned by individual users. Replication is the only sensible means to provide ubiquitous access to private data. However, without provisions, replication endangers privacy by enlarging the Trusted Computing Base. The ...
    • QoS applied to security in mobile computing 

      Fallmyr, Terje; Stabell-Kulø, Tage (Research report; Forskningsrapport, 1997-06-30)
      Hand-held mobile computers have the potential to become important communication tools for roaming users. As such, they will also become very personal. They will be used under a wide range of operating conditions, and tight user control will be enforced on issues like power consumption, consistency control, and trust management. Their ability to adapt will be the key to their success. In this paper ...
    • Secure communication in FRTP 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1995-02)
      To ensure privacy, users of the File Repository Transfer Protocol (Frtp) may require that communication partners are properly authenticated. If one partner wants the communication to be crypted, the other must honor the request. This report describes how authentication and privacy are realized. It is shown, by means of an authentication logic, that the protocol achives its goal in this respect.
    • Security in the PASTA project 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1997-02-04)
      This paper presents the system model for the work on security in the Pasta project. We present the objectives of the security effort, the threats we will consider, and those we will not consider. As such, the paper describes the environment which applications must be prepared to face, and still provide users with the desired degree of privacy.
    • Some hints on the theory and practice of authentication in distributed systems 

      Stabell-Kulø, Tage; Bottoni, Andrea (Research report; Forskningsrapport, 2003-05-17)
      Authentication in Distributed Systems: Theory and Practice provides considerable insight. However, it can be hard to read, as many details are left out, probably for brevity; it is still 45 pages long. We provide detailed explanations of tricky points.
    • The taste of Pesto 

      Dillema, Feike W.; Stabell-Kulø, Tage (Research report; Forskningsrapport, 2001-08)
      The Pesto distributed storage platform is geared towards a computing model where private machines play a pivotal r ˆ ole. We argue that no centralized solutions are acceptable in its design and that it supports allocation of separate tasks to separate system components found in its target environment. Hence, Pesto separates trust from responsibility, storage from access control policy, and ...