Now showing items 1-16 of 16

    • API Keys to the Kingdom 

      FARRELL, STEPHEN (IEEE Computer Society Press, 2009)
      Many Web 2.0 services offer Web 2.0 APIs for developers to use. In this article, I review one of the security mechanisms that's often included in such Web 2.0 APIs - the use of API keys - and some of the deployment issues ...
    • Delay- and Disruption-Tolerant Networking 

      FARRELL, STEPHEN (IEEE, 2009)
      Delay- and disruption-tolerant networking (DTN) grew out of attempts to develop an interplanetary Internet but has evolved into an active area of networking research, with applications in space networking, military tactical ...
    • DTN: An Architectural Retrospective 

      FARRELL, STEPHEN (IEEE, 2008)
      We review the rationale behind the current design of the Delay/Disruption Tolerant Networking (DTN) Architecture and highlight some remaining open issues. Its evolution, from a focus on deep space to a broader class of ...
    • Evaluating LTP-T: A DTN-Friendly Transport Protocol 

      CAHILL, VINNY; FARRELL, STEPHEN (2007)
      The Licklider Transmission Protocol (LTP) is a delay-tolerant point-to-point protocol being developed by the Delay-Tolerant Networking Research Group (DTNRG). LTP-Transport is an extension to LTP that provides end-to-end ...
    • Keys don't grow in threes 

      FARRELL, STEPHEN (IEEE, 2009)
      Many Internet security mechanisms depend on the use of cryptographic algorithms for various forms of authentication and confidentiality. Even when well-known and standardized cryptographic algorithms are used in well-known ...
    • Leaky or Guessable Session Identifiers 

      FARRELL, STEPHEN (IEEE, 2011)
      Many Internet and Web applications use session identifiers. Too often, developers of those applications make the bad assumption that all is well because session identifiers are only known to authorized users. However, in ...
    • Password policy purgatory 

      FARRELL, STEPHEN (IEEE, 2008)
      IT system users, (all of us), and administrators, (increasingly large numbers of us), must all manage some passwords. In this article, the author reviews some issues related to password policies and concludes that managing ...
    • Portable storage and data loss 

      FARRELL, STEPHEN (IEEE, 2008)
      Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. In this paper, the author considers information ...
    • Report on an Arctic summer DTN trial 

      FARRELL, STEPHEN; MCMAHON, ALEX MARK (Springer, 2011)
      Delay- and disruption-tolerant networking (DTN) is an emerging area of networking research that will benefit from real-world trials and testbeds. We describe a week long DTN trial carried out during the summer of 2009 in ...
    • Security Boundaries 

      FARRELL, STEPHEN (2008)
      Security boundaries are usually defined by a set of systems that are under a single administrative control. These boundaries occur at various levels, and vulnerabilities can become apparent as data crosses each boundary. ...
    • Security considerations in space and delay tolerant networks 

      CAHILL, VINNY; FARRELL, STEPHEN (2006)
      This paper reviews the Internet-inspired security work on delay tolerant networking, in particular, as it might apply to space missions, and identifies some challenges arising, for both the Internet security community and ...
    • Sensor network with delay tolerance (SeNDT) 

      CAHILL, VINNY; FARRELL, STEPHEN (IEEE, 2007)
      As the technology underlying sensor networks becomes more advanced and reliable, ubiquitous computing will come closer to being a reality. This paper details the design and deployment of several sensor nodes that use ...
    • Transmission protocols for challenging networks: : LTP and LTP-T 

      FARRELL, STEPHEN (IEEE, 2007)
      Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymmetric ...
    • When TCP breaks: Delay- and Disruption- tolerant networking 

      FARRELL, STEPHEN; CAHILL, VINNY (2006)
      The authors give an overview of current work on delay- and disruption-tolerant networking and review the overall architecture proposed by the Internet Research Task Force?s Delay Tolerant Networking Research Group.Their ...
    • Why didn't we spot that? 

      FARRELL, STEPHEN (IEEE, 2010)
      The Secure Sockets Layer (SSL) protocol and its standards-track successor, the Transport Layer Security (TLS) protocol, were developed more than a decade ago and have generally withstood scrutiny in that the protocols ...
    • Why Don't We Encrypt Our Email? 

      FARRELL, STEPHEN (IEEE, 2009)
      Today, almost all the programs we use to send and receive email include support for strong security mechanisms that we can apply end-to-end. But we generally don't use those - why is that? In this article, the author briefly ...