Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by HariGovind V. Ramasamy.
autonomic and trusted computing | 2007
Hans Löhr; HariGovind V. Ramasamy; Ahmad-Reza Sadeghi; Stefan Schulz; Matthias Schunter; Christian Stüble
Grid applications increasingly have sophisticated functional and security requirements. Current techniques mostly protect the grid resource provider from attacks by the grid user, while leaving the user comparatively dependent on the well-behavior of the provider. We present the key components for a trustworthy grid architecture and address this trust asymmetry by using a combination of trusted computing and virtualization technologies. We propose a scalable offline attestation protocol, which allows the selection of trustworthy partners in the grid with low overhead. By providing multilateral security, i.e., security for both the grid user and the grid provider, our protocol increases the confidence that can be placed on the correctness of a grid computation and on the protection of user-provided assets.
computer and communications security | 2007
Serdar Cabuk; Chris I. Dalton; HariGovind V. Ramasamy; Matthias Schunter
We describe a secure network virtualization framework that helps realize the abstraction of Trusted Virtual Domains (TVDs), a security-enhanced variant of virtualized network zones. The framework allows groups of related virtual machines running on separate physical machines to be connected together as though there were on their own separate network fabric and, at the same time, helps enforce cross-group security requirements such as isolation, confidentiality, security, and information flow control. The framework uses existing network virtualization technologies, such as Ethernet encapsulation, VLAN tagging, and VPNs, and combines and orchestrates them appropriately to implement TVDs. Our framework aims at automating the instantiation and deployment of the appropriate security mechanism and network virtualization technologies based on an input security model that specifies the required level of isolation and permitted network flows. We have implemented a prototype of the framework based on the Xen hypervisor. Experimental evaluation of the prototype shows that the performance of our virtual networking extensions is comparable to that of the standard Xen configuration.
Journal of Computer Security | 2010
Serdar Cabuk; Chris I. Dalton; Konrad Eriksson; Dirk Kuhlmann; HariGovind V. Ramasamy; Gianluca Ramunno; Ahmad-Reza Sadeghi; Matthias Schunter; Christian Stüble
Serdar Cabuk a, Chris I. Dalton a, Konrad Eriksson b, Dirk Kuhlmann a, HariGovind V. Ramasamy c, Gianluca Ramunno d, Ahmad-Reza Sadeghi e, Matthias Schunter b and Christian Stuble f a Hewlett–Packard Labs, Bristol, UK E-mails: [email protected], {cid,dirk.kuhlmann}@hp.com b IBM Zurich Research Laboratory, Ruschlikon, Switzerland E-mails: {kon,mts}@zurich.ibm.com c IBM T. J. Watson Research Center, Hawthorne, NY, USA E-mail: [email protected] d Politecnico di Torino, Turin, Italy E-mail: [email protected] e Ruhr-University Bochum, Germany E-mail: [email protected] f Sirrix AG Security Technologies, Bochum, Germany E-mail: [email protected]
international conference on principles of distributed systems | 2005
HariGovind V. Ramasamy; Christian Cachin
Atomic broadcast is a communication primitive that allows a group of n parties to deliver a common sequence of payload messages despite the failure of some parties. We address the problem of asynchronous atomic broadcast when up to t < n/3 parties may exhibit Byzantine behavior. We provide the first protocol with an amortized expected message complexity of
latin-american symposium on dependable computing | 2003
Vishu Gupta; Vinh Vi Lam; HariGovind V. Ramasamy; William H. Sanders; Sankalp Singh
\mathcal{O}(n)
haifa experimental systems conference | 2010
Nikolai Joukov; Birgit Pfitzmann; HariGovind V. Ramasamy; Murthy V. Devarakonda
per delivered payload. The most efficient previous solutions are the BFT protocol by Castro and Liskov and the KS protocol by Kursawe and Shoup, both of which have message complexity
virtual execution environments | 2008
Bernhard Jansen; HariGovind V. Ramasamy; Matthias Schunter
\mathcal{O}(n^2)
Software - Practice and Experience | 2006
Partha P. Pal; Paul Rubel; Michael Atighetchi; Franklin Webber; William H. Sanders; Mouna Seri; HariGovind V. Ramasamy; James Lyons; Tod Courtney; Adnan Agbaria; Michel Cukier; Jeanna M. Gossett; Idit Keidar
. Like the BFT and KS protocols, our protocol is optimistic and uses inexpensive mechanisms during periods when no faults occur; when network instability or faults are detected, it switches to a more expensive recovery mode. The key idea of our solution is to replace reliable broadcast in the KS protocol by consistent broadcast, which reduces the message complexity from
ieee international conference on services computing | 2013
Saeed Al-Haj; Ehab Al-Shaer; HariGovind V. Ramasamy
\mathcal{O}(n^2)
ieee international conference on services computing | 2009
Nikolai Joukov; Birgit Pfitzmann; HariGovind V. Ramasamy; Norbert G. Vogl; Murthy V. Devarakonda; Tryg Ager
to