Dynamic PKI and secure tuplespaces for distributed coalitions

The Yalta project has developed a scalable, reliable application platform for distributed coalitions. The key components of this infrastructure are a reliable, secure tuplespace service, an intrusion-tolerant, threshold-based certification authority, and a scalable certificate revocation and event notification service. These components combine to provide a highly transparent security infrastructure for distributed, dynamic coalition applications.

[1]  Carlisle M. Adams,et al.  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.

[2]  Dan Boneh,et al.  Experimenting with Shared Generation of RSA Keys , 1999, NDSS.

[3]  Li Gong,et al.  User authentication and authorization in the Java/sup TM/ platform , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[4]  Dan Boneh,et al.  Building intrusion tolerant applications , 1999, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[5]  Matthew K. Franklin,et al.  Efficient generation of shared RSA keys , 2001, JACM.

[6]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[7]  Gregory T. Byrd,et al.  Yalta: A Secure Collaborative Space for Dynamic Coalitions , 2001 .

[8]  Milind Nemlekar,et al.  Scalable Distributed Tuplespaces , 2001 .

[9]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[10]  Yongdae Kim,et al.  Secure group communication in asynchronous networks with failures: integration and experiments , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[11]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[12]  Victor Shoup,et al.  Practical Threshold Signatures , 2000, EUROCRYPT.

[13]  Matthew K. Franklin,et al.  Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.

[14]  Feiyi Wang,et al.  SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[15]  David Gelernter,et al.  Generative communication in Linda , 1985, TOPL.

[16]  Ken Arnold,et al.  JavaSpaces¿ Principles, Patterns, and Practice , 1999 .

[17]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .