A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit <a rel="external noopener" href="http://www.cs.ncl.ac.uk:80/research/pubs/inproceedings/papers/362.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="Springer Berlin Heidelberg">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a>
This paper describes a technique, called Object-Oriented Fragmented Data Processing, for jointly improving the reliability and security with which distributed computing systems process sensitive information. The technique protects the information contained in, and the processing performed by, a given object by first fragmenting the object into the subsidiary objects of which it is composed. It then relies on the (i) the correct execution of a majority of a set of copies of these subsidiary<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0013899">doi:10.1007/bfb0013899</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wqrweyc32bftxmzbzpq2ms6kia">fatcat:wqrweyc32bftxmzbzpq2ms6kia</a> </span>
more »... ts, and (ii) the reliable storage of a majority of a set of copies of each of these subsidiary objects, having distributed the subsidiary objects widely across a number of computers in a distributed computing system. The intent is to impede intruders and to tolerate faults, and involves ensuring that an isolated subsidiary object is not significant, due to the lack of information it would provide to a potential intruder. This technique can be applied to application objects and/or to the objects used in the implementation of the basic object-oriented system. The paper illustrates the technique using a detailed example, of an "electronic diary", that has been designed using Eiffel, and experimented with using the DELTA-4 Support Environment. whereby critical applications are implemented using physically and/or logically protected computers; such protection is usually based on the TCB (Trusted Computing Base) or NTCB (Network Trusted Computing Base) concepts. Here we provide instead an overview of recent work to a combined approach to the provision of both reliability/availability and security, as applied to object-oriented systems.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040331224504/http://www.cs.ncl.ac.uk:80/research/pubs/inproceedings/papers/362.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e3/75/e375b75a9c4652610de7485fe1126771161479e8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0013899"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>