Josva Kleist - Academia.edu (original) (raw)
Papers by Josva Kleist
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
This report documents the attempt to raise security for clients against a threat model, with thes... more This report documents the attempt to raise security for clients against a threat model, with these three at-tacks; Man In The Middle (MITM), phishing, and tampering attacks. The analysis describes security mechanisms and existing technology to prevent the three attacks in the threat model. It was discovered in the analysis that there exists tech-nology to prevent MITM and phish-ing attacks, but no security mecha-nism exist to prevent tampering of Java client programs. Instead of designing and implement-ing existing technology as secu-rity mechanisms to prevent MITM and phishing attacks, the project should be, to design and imple-ment a possible tamper-proofing se-curity mechanism for Java client programs. In the design and imple-mentation chapters, documentation of the prototype tamper-proofing se-curity mechanism is found. The test shows that the security mechanism is not sufficient, to en-sure that the client was actual tamper-proof. However, when the prototype was tested, a nice ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Distributed systems and semantics, operating system architectures, formal security models
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object ... more In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object migration was suggested as creating a (remote) copy of an objects' state at the target site, followed by turning the (local) object itself into a surro-gate, i.e. a pointer to the just created remote copy. This kind of migration is only safe |migrated objects shall behave the same before and after migration|if it is protected and serialized. Protected objects can only be accessed by clients via selection, and within a serialized object at most one method can be active at any time. Yet, since Obliq does not have a formal semantics, there is no proof of this claim. In this abstract, we consider the act of creating object surrogates as an abstraction of the above-mentioned style of migration. We introduce the language jeblik, a simpliied distribution-free subset of Obliq, and give its formal semantics in terms of an encoding into the-calculus. This semantics shall provide the ground for...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Journal of Physics: Conference Series, 2008
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Reproduction of all or part of this work is permitted for educational or research use on conditio... more Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy. See back inner page for a list of recent BRICS Report Series publications. Copies may be obtained by contacting: BRICS
Bookmarks Related papers MentionsView impact
. Obliq is a distributed, object-based programming language. In Obliq, the migration of an object... more . Obliq is a distributed, object-based programming language. In Obliq, the migration of an object is proposed as creating a clone of the object at the target site, whereafter the original object is turned into an alias for the clone. Obliq has an only informal semantics, so there is no proof that this style of migration is correct, i.e., transparent to object clients. In this paper, we focus on jeblik, an abstraction of Obliq. We give a -calculus semantics to jeblik, and we use it to formally prove the correctness of object surrogation, an abstraction of object migration. 1 Introduction The work presented in this paper is in line with the research activity to use the -calculus as a toolbox for reasoning about distributed object-oriented programming languages. Former works on the semantics of objects as processes have shown the value of this approach: while [22, 9, 19, 10] have focused on just providing formal semantics to object-oriented languages and language features, th...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
IEEE Communications Magazine, 2014
ABSTRACT Global research collaborations today require reliable and secure dedicated network conne... more ABSTRACT Global research collaborations today require reliable and secure dedicated network connections to facilitate data communications between collaborating partners. To deal with the deluge of data, dedicated connections are needed to transport data in a highly efficient manner. Managing such links, which often cross multiple administrative domains with heterogeneous infrastructure, poses many compelling research challenges, one of which is interdomain network monitoring. In this article, a multidomain circuit monitoring system, CMon, is introduced. Using some services of G??ANT perfSONAR MDM, CMon is able to provide end-to-end circuit monitoring services with great flexibility, extensibility, and vendor independence, regardless of the underlying circuit provisioning systems. The architecture of CMon, by using measurement federations, can adapt to either changes in the circuit provisioning system or expansion of network size.
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 1999
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
This report documents the attempt to raise security for clients against a threat model, with thes... more This report documents the attempt to raise security for clients against a threat model, with these three at-tacks; Man In The Middle (MITM), phishing, and tampering attacks. The analysis describes security mechanisms and existing technology to prevent the three attacks in the threat model. It was discovered in the analysis that there exists tech-nology to prevent MITM and phish-ing attacks, but no security mecha-nism exist to prevent tampering of Java client programs. Instead of designing and implement-ing existing technology as secu-rity mechanisms to prevent MITM and phishing attacks, the project should be, to design and imple-ment a possible tamper-proofing se-curity mechanism for Java client programs. In the design and imple-mentation chapters, documentation of the prototype tamper-proofing se-curity mechanism is found. The test shows that the security mechanism is not sufficient, to en-sure that the client was actual tamper-proof. However, when the prototype was tested, a nice ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Distributed systems and semantics, operating system architectures, formal security models
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object ... more In Cardelli's lexically scoped, distributed, object-based programming language Obliq, object migration was suggested as creating a (remote) copy of an objects' state at the target site, followed by turning the (local) object itself into a surro-gate, i.e. a pointer to the just created remote copy. This kind of migration is only safe |migrated objects shall behave the same before and after migration|if it is protected and serialized. Protected objects can only be accessed by clients via selection, and within a serialized object at most one method can be active at any time. Yet, since Obliq does not have a formal semantics, there is no proof of this claim. In this abstract, we consider the act of creating object surrogates as an abstraction of the above-mentioned style of migration. We introduce the language jeblik, a simpliied distribution-free subset of Obliq, and give its formal semantics in terms of an encoding into the-calculus. This semantics shall provide the ground for...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Journal of Physics: Conference Series, 2008
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Reproduction of all or part of this work is permitted for educational or research use on conditio... more Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy. See back inner page for a list of recent BRICS Report Series publications. Copies may be obtained by contacting: BRICS
Bookmarks Related papers MentionsView impact
. Obliq is a distributed, object-based programming language. In Obliq, the migration of an object... more . Obliq is a distributed, object-based programming language. In Obliq, the migration of an object is proposed as creating a clone of the object at the target site, whereafter the original object is turned into an alias for the clone. Obliq has an only informal semantics, so there is no proof that this style of migration is correct, i.e., transparent to object clients. In this paper, we focus on jeblik, an abstraction of Obliq. We give a -calculus semantics to jeblik, and we use it to formally prove the correctness of object surrogation, an abstraction of object migration. 1 Introduction The work presented in this paper is in line with the research activity to use the -calculus as a toolbox for reasoning about distributed object-oriented programming languages. Former works on the semantics of objects as processes have shown the value of this approach: while [22, 9, 19, 10] have focused on just providing formal semantics to object-oriented languages and language features, th...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
IEEE Communications Magazine, 2014
ABSTRACT Global research collaborations today require reliable and secure dedicated network conne... more ABSTRACT Global research collaborations today require reliable and secure dedicated network connections to facilitate data communications between collaborating partners. To deal with the deluge of data, dedicated connections are needed to transport data in a highly efficient manner. Managing such links, which often cross multiple administrative domains with heterogeneous infrastructure, poses many compelling research challenges, one of which is interdomain network monitoring. In this article, a multidomain circuit monitoring system, CMon, is introduced. Using some services of G??ANT perfSONAR MDM, CMon is able to provide end-to-end circuit monitoring services with great flexibility, extensibility, and vendor independence, regardless of the underlying circuit provisioning systems. The architecture of CMon, by using measurement federations, can adapt to either changes in the circuit provisioning system or expansion of network size.
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 1999
Bookmarks Related papers MentionsView impact