2010
DOI: 10.1016/j.future.2009.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Secure token passing at application level

Abstract: We introduce an application level implementation of a token passing operation. After an introduction that explains the conceptual principles, we describe exhaustively the state machines that implement our solution. The security requirements are carefully considered, since the token is a sensitive resource, but without introducing scalability limits.We aim at a general purpose token passing primitive: we do not enter the domain of the distributed coordination algorithms that can be implemented using the propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…We injected a token loss event every 10000 seconds (3 hours), while the system supports the nominal number of subscribers. The frequency of token loss events used in our simulation is more than ten times higher than packet loss rate observed in the open Internet: further, a 4-way secure token passing protocol has been developed and described in Ciuffoletti (2007) that reduces the average frequency of loss events to approximately one week, in the scale of our case study, introducing a token latency that is compatible with our use case. Simulation results show that the algorithm promptly recovers from the presence of spurious tokens, indicated by narrow positive spikes; spurious tokens never exceed the number of two.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We injected a token loss event every 10000 seconds (3 hours), while the system supports the nominal number of subscribers. The frequency of token loss events used in our simulation is more than ten times higher than packet loss rate observed in the open Internet: further, a 4-way secure token passing protocol has been developed and described in Ciuffoletti (2007) that reduces the average frequency of loss events to approximately one week, in the scale of our case study, introducing a token latency that is compatible with our use case. Simulation results show that the algorithm promptly recovers from the presence of spurious tokens, indicated by narrow positive spikes; spurious tokens never exceed the number of two.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The risk of overkilling such problems, introducing algorithms that are more expensive than the resource sharing protocol is real. We have studied such problems, and presented our results in Ciuffoletti (2007).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The former simplification is meant to have a small impact on the significance of our protoytpe: in a separate paper [4] we address experimental results for an authenticated token passing protocol, and the impact of signing/checking is minimal The prototype has been run on a testbed on the development infrastructure Grid5000 [1]. Grid5000 is a research project of the French Government.…”
Section: Resultsmentioning
confidence: 99%