Abstract
TrustedFlowTM is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from which they have emanated is not changed prior to and during execution. TrustedFlowTM can be used to create a run-time trust relationship between the components of a distributed management system.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Baldi, M., Ofek, Y., Yung, M.: Idiosyncratic Signatures for Authenticated Execution - The TrustedFlowTMTM. Protocol and its Application to TCP. In: IASTED CSN 2003, Benalmadena, Spain (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Baldi, M., Ofek, Y., Yung, M. (2003). Idiosyncratic Signatures for Authenticated Execution of Management Code. In: Brunner, M., Keller, A. (eds) Self-Managing Distributed Systems. DSOM 2003. Lecture Notes in Computer Science, vol 2867. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39671-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-39671-0_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20314-8
Online ISBN: 978-3-540-39671-0
eBook Packages: Springer Book Archive