Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Stack and Queue Integrity on Hostile Platforms
Devanbu P., Stubblebine S. IEEE Transactions on Software Engineering28 (1):100-108,2002.Type:Article
Date Reviewed: Oct 7 2002

The authors present a protocol for maintaining the integrity of stacks and queues processed by a potentially hostile processor (H), when resources of the trusted processor (T) are too limited to allow for processing of stacks and queues.

For a stack protocol, the authors use a random number generator and a one-way hash function. In effect, for each datum, the datum itself and a hash value are pushed onto the stack, and, upon popping, the topmost datum and a hash value are returned by H to T. T then tests the hashed value to check whether integrity of the stack was compromised. The authors show that the protocol is secure, as long the hash function is collision-resistant and second preimage-resistant. The authors also present a protocol for queue processing that uses a keyed one-way hash function.

The protocols for stacks and queues require constant memory in T, and transfer a constant amount of data. This is an improvement over previous approaches, which were of the order O(log n). The authors briefly address the issue of application, particularly in the context of secure RAM management, in the context of the Java virtual machine, and in the context of distributed processing.

Reviewer:  Adam Drozdek Review #: CR126510 (0212-0709)
Bookmark and Share
 
Lists, Stacks, And Queues (E.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Lists, Stacks, And Queues": Date
A priority queue for the all pairs shortest path problem
Moffat A., Takaoka T. Information Processing Letters 18(4): 189-193, 1984. Type: Article
Mar 1 1985
Amortized efficiency of list update and paging rules
Sleator D., Tarjan R. (ed) Communications of the ACM 28(2): 202-208, 1985. Type: Article
Nov 1 1985
Self-organizing search lists using probabilistic back-pointers
Hester J., Hirschberg D. Communications of the ACM 30(12): 1074-1079, 1987. Type: Article
Oct 1 1988
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy