A security architecture for object-based distributed systems
Large-scale distributed systems present numerous security problems not present in local systems. We present a general security architecture for a large-scale object-based distributed system. Its main features include ways for servers to authenticate clients, clients to authenticate servers, new secu...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 171 |
---|---|
container_issue | |
container_start_page | 161 |
container_title | |
container_volume | |
creator | Popescu, B.C. van Steen, M. Tanenbaum, A.S. |
description | Large-scale distributed systems present numerous security problems not present in local systems. We present a general security architecture for a large-scale object-based distributed system. Its main features include ways for servers to authenticate clients, clients to authenticate servers, new secure servers to be instantiated without manual intervention, and ways to restrict which client can perform which operation on which object. All of these features are done in a platform- and application-independent way, so the results are quite general. The basic idea behind the scheme is to have each object owner issue cryptographically sealed certificates to users to prove which operations they may request and to servers to prove which operations they are authorized to execute. These certificates are used to ensure secure binding and secure method invocation. The paper discusses the required certificates and security protocols for using them. |
doi_str_mv | 10.1109/CSAC.2002.1176288 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1176288</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1176288</ieee_id><sourcerecordid>1176288</sourcerecordid><originalsourceid>FETCH-LOGICAL-i218t-1341805451110518467d2bd783d65415bd523ca0171cb4baa4be66d542d42d143</originalsourceid><addsrcrecordid>eNotj01LAzEYhIMfYFv9AeJl_0Dq--Y74GVZrAoFD-q5JJsUUyyVJHvYf2_AwsDMcxlmCLlHWCOCfRw--mHNAFhDrZgxF2TBpFbUIvBLsgStrETDDF6RBYLi1Eqmb8iylAMAWqtxQZ76rsRxyqnOncvjd6pxrFOO3f6Uu5M_NKLelRi6kErNyU-15TKXGo_lllzv3U-Jd2dfka_N8-fwSrfvL29Dv6WJoakUuUADUkhsu9sioXRgPmjDg5ICpQ-S8dEBahy98M4JH5UKUrDQhIKvyMN_b4ox7n5zOro8786v-R-2iEh3</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A security architecture for object-based distributed systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Popescu, B.C. ; van Steen, M. ; Tanenbaum, A.S.</creator><creatorcontrib>Popescu, B.C. ; van Steen, M. ; Tanenbaum, A.S.</creatorcontrib><description>Large-scale distributed systems present numerous security problems not present in local systems. We present a general security architecture for a large-scale object-based distributed system. Its main features include ways for servers to authenticate clients, clients to authenticate servers, new secure servers to be instantiated without manual intervention, and ways to restrict which client can perform which operation on which object. All of these features are done in a platform- and application-independent way, so the results are quite general. The basic idea behind the scheme is to have each object owner issue cryptographically sealed certificates to users to prove which operations they may request and to servers to prove which operations they are authorized to execute. These certificates are used to ensure secure binding and secure method invocation. The paper discusses the required certificates and security protocols for using them.</description><identifier>ISSN: 1063-9527</identifier><identifier>ISBN: 0769518281</identifier><identifier>ISBN: 9780769518282</identifier><identifier>EISSN: 2576-9103</identifier><identifier>DOI: 10.1109/CSAC.2002.1176288</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Communication system traffic control ; Cryptographic protocols ; Cryptography ; Large-scale systems ; Manuals ; Middleware ; Operating systems ; Protection ; Security</subject><ispartof>18th Annual Computer Security Applications Conference, 2002. Proceedings, 2002, p.161-171</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1176288$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1176288$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Popescu, B.C.</creatorcontrib><creatorcontrib>van Steen, M.</creatorcontrib><creatorcontrib>Tanenbaum, A.S.</creatorcontrib><title>A security architecture for object-based distributed systems</title><title>18th Annual Computer Security Applications Conference, 2002. Proceedings</title><addtitle>CSAC</addtitle><description>Large-scale distributed systems present numerous security problems not present in local systems. We present a general security architecture for a large-scale object-based distributed system. Its main features include ways for servers to authenticate clients, clients to authenticate servers, new secure servers to be instantiated without manual intervention, and ways to restrict which client can perform which operation on which object. All of these features are done in a platform- and application-independent way, so the results are quite general. The basic idea behind the scheme is to have each object owner issue cryptographically sealed certificates to users to prove which operations they may request and to servers to prove which operations they are authorized to execute. These certificates are used to ensure secure binding and secure method invocation. The paper discusses the required certificates and security protocols for using them.</description><subject>Access control</subject><subject>Communication system traffic control</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Large-scale systems</subject><subject>Manuals</subject><subject>Middleware</subject><subject>Operating systems</subject><subject>Protection</subject><subject>Security</subject><issn>1063-9527</issn><issn>2576-9103</issn><isbn>0769518281</isbn><isbn>9780769518282</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2002</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj01LAzEYhIMfYFv9AeJl_0Dq--Y74GVZrAoFD-q5JJsUUyyVJHvYf2_AwsDMcxlmCLlHWCOCfRw--mHNAFhDrZgxF2TBpFbUIvBLsgStrETDDF6RBYLi1Eqmb8iylAMAWqtxQZ76rsRxyqnOncvjd6pxrFOO3f6Uu5M_NKLelRi6kErNyU-15TKXGo_lllzv3U-Jd2dfka_N8-fwSrfvL29Dv6WJoakUuUADUkhsu9sioXRgPmjDg5ICpQ-S8dEBahy98M4JH5UKUrDQhIKvyMN_b4ox7n5zOro8786v-R-2iEh3</recordid><startdate>2002</startdate><enddate>2002</enddate><creator>Popescu, B.C.</creator><creator>van Steen, M.</creator><creator>Tanenbaum, A.S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2002</creationdate><title>A security architecture for object-based distributed systems</title><author>Popescu, B.C. ; van Steen, M. ; Tanenbaum, A.S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i218t-1341805451110518467d2bd783d65415bd523ca0171cb4baa4be66d542d42d143</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2002</creationdate><topic>Access control</topic><topic>Communication system traffic control</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Large-scale systems</topic><topic>Manuals</topic><topic>Middleware</topic><topic>Operating systems</topic><topic>Protection</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Popescu, B.C.</creatorcontrib><creatorcontrib>van Steen, M.</creatorcontrib><creatorcontrib>Tanenbaum, A.S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Popescu, B.C.</au><au>van Steen, M.</au><au>Tanenbaum, A.S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A security architecture for object-based distributed systems</atitle><btitle>18th Annual Computer Security Applications Conference, 2002. Proceedings</btitle><stitle>CSAC</stitle><date>2002</date><risdate>2002</risdate><spage>161</spage><epage>171</epage><pages>161-171</pages><issn>1063-9527</issn><eissn>2576-9103</eissn><isbn>0769518281</isbn><isbn>9780769518282</isbn><abstract>Large-scale distributed systems present numerous security problems not present in local systems. We present a general security architecture for a large-scale object-based distributed system. Its main features include ways for servers to authenticate clients, clients to authenticate servers, new secure servers to be instantiated without manual intervention, and ways to restrict which client can perform which operation on which object. All of these features are done in a platform- and application-independent way, so the results are quite general. The basic idea behind the scheme is to have each object owner issue cryptographically sealed certificates to users to prove which operations they may request and to servers to prove which operations they are authorized to execute. These certificates are used to ensure secure binding and secure method invocation. The paper discusses the required certificates and security protocols for using them.</abstract><pub>IEEE</pub><doi>10.1109/CSAC.2002.1176288</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-9527 |
ispartof | 18th Annual Computer Security Applications Conference, 2002. Proceedings, 2002, p.161-171 |
issn | 1063-9527 2576-9103 |
language | eng |
recordid | cdi_ieee_primary_1176288 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Communication system traffic control Cryptographic protocols Cryptography Large-scale systems Manuals Middleware Operating systems Protection Security |
title | A security architecture for object-based distributed systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T02%3A39%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20security%20architecture%20for%20object-based%20distributed%20systems&rft.btitle=18th%20Annual%20Computer%20Security%20Applications%20Conference,%202002.%20Proceedings&rft.au=Popescu,%20B.C.&rft.date=2002&rft.spage=161&rft.epage=171&rft.pages=161-171&rft.issn=1063-9527&rft.eissn=2576-9103&rft.isbn=0769518281&rft.isbn_list=9780769518282&rft_id=info:doi/10.1109/CSAC.2002.1176288&rft_dat=%3Cieee_6IE%3E1176288%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1176288&rfr_iscdi=true |