A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Practical delegation for secure distributed object environments
1998
Distributed Systems Engineering
Libraries Privacy Policy (Version 2.0) Updated October 4, 2013
PERSONAL SECURITY Users share in the responsibility for ensuring that their personal information is adequately protected. ...
When using the Libraries' computers, users must keep their University Information secure from unauthorized access by keeping their password secret. ...
Except for Business Transactions, if a Libraries staff member or affiliated Libraries service (including an online database) requests your social security number, please contact the Director of the Libraries ...
doi:10.1088/0967-1846/5/4/004
fatcat:vdlk5xgehfhd3fudfv4dpgtbaq
Design of a Security Management Middleware in Ubiquitous Computing Environments
2005
Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05)
It also provides management services which can monitor and control the managed objects and sensors for the domain security management. ...
In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-centric security. ...
In CASA, they proposed secure service architecture for context-aware environments. ...
doi:10.1109/pdcat.2005.120
dblp:conf/pdcat/JiangLKBKK05
fatcat:4xzvvk4il5dhzcbop64hi5fgu4
Security Issues in a Mobile Computing Paradigm
[chapter]
1997
IFIP Advances in Information and Communication Technology
In this paper, we discuss operational and security issues arising from the use of mobile components in distributed systems. ...
Mobile computing is tightly depending on available infrastructure of distributed systems. As a result, we can see it as an extension of distributed systems computing. ...
Mobile agents We use mobile agents to provide a paradigm for distributed object computing, encompassing synchrony and asynchrony, message-passing and object-passing, and stationary objects and mobile objects ...
doi:10.1007/978-0-387-35256-5_5
fatcat:usqrbl2q7betfas643qynlpx5y
Dynamic Access Control for Ubiquitous Environments
[chapter]
2004
Lecture Notes in Computer Science
This paper presents a domain-based approach to access control in distributed environments with mobile, distributed objects and nodes. ...
Combining access control requirements and multilevel security with mobile and contextual requirements of active objects allow us to re-evaluate security considerations for mobile objects. ...
In increasing the number of objects we used a fixed number of mobile nodes, 4 security levels and a random distribution for migrating the objects. ...
doi:10.1007/978-3-540-30469-2_49
fatcat:c7lrx3quyvehhdfxzoqleoojgy
Distributed Object Systems Security
[chapter]
1995
IFIP Advances in Information and Communication Technology
In this paper, we consider a distributed object environment, and describe how security services and mechanisms can be provided. ...
.), Information Security -the Next Decade © IFIP International Federation for Information Processing 1995 ...
Introduction Security plays a vital role in the design, development and practical use of the distributed computing environment, for greater availability and access to information in turn imply that distributed ...
doi:10.1007/978-0-387-34873-5_23
fatcat:apw4qosh2velnkkiwsfofwkfne
Efficient and Secure Information Sharing in Distributed, Collaborative Environments
[chapter]
2000
Communication-Based Systems
secure, efficient, and satisfy specified access constraints. ...
In addition, they improve overall efficiency by permitting migration of computations to, and caching of services in, partly trusted environments of another organization. ...
Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright annotation thereon. ...
doi:10.1007/978-94-015-9608-4_12
fatcat:detesqk4zjd3lc24mayy26dl3e
Role-based Protection and Delegation for Mobile Object Environments
[chapter]
1998
Lecture Notes in Computer Science
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a network to accomplish ...
The framework supports a control API for application developers to specify mechanisms and security policies. ...
The proposed protection model is a simple and natural extension of the current Java security architecture and is proposed for distributed Java environments. ...
doi:10.1007/3-540-49255-0_74
fatcat:vbibo3rofneavdqhrd26fwnnsi
Enhanced Information Security in Distributed Mobile System Based on Delegate Object Model
2012
Procedia Engineering
The main objective of this paper is to provide secured transaction in Mobile system based on delegate object model. ...
Security algorithms used for wired networks cannot be applied to wireless systems, since wireless network clients come with limited resources and processing power. . ...
The structure of a distributed mobile system with delegate object is as shown in Figure 2 .
4.1Object-Access Level Security Object-access level security, which could control access to objects Read ...
doi:10.1016/j.proeng.2012.01.927
fatcat:fs4dn4icjjh5jbad2qmn36b2rm
Toward Realizable Restricted Delegation in Computational Grids1
[chapter]
2001
Lecture Notes in Computer Science
Challenges include determining the rights to delegate and easily implementing such delegation. Approaches are discussed in the context of Legion, an object-based infrastructure for Grids. ...
Each approach is suited for different situations and objectives. ...
Erdos and Pato present an architecture for implementing delegation in the Distributed Computing Environment (DCE) [3] . ...
doi:10.1007/3-540-48228-8_4
fatcat:25toqxh5cfbmhdi52ajajeqgny
A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing
2013
International Journal of Digital Content Technology and its Applications
environment. ...
high security terminal platforms, ensures bidirectional trust relation between the multimedia contents providers and the end users, and meanwhile satisfies the basic privacy protection and security requirement ...
Ours
Secure
distribution of
Digital contents
Contents
encryption
Contents
encryption
Contents
encryption
Contents
encryption
AP 2 RA
remote
attestation
Secure
distribution of ...
doi:10.4156/jdcta.vol7.issue4.95
fatcat:zcua5f5is5cxtcppv7zfuziuqu
A new model of security for distributed systems
1996
Proceedings of the 1996 workshop on New security paradigms - NSPW '96
With the rapid growth of the information age, open distributed systems have become increasingly popular. The need for protection and security in a distributed environment has never been greater. ...
The conventional approach to security has been to enforce a system-wide policy, but this approach will not work for large distributed systems where entirely new security issues and concerns are emerging ...
an object might trust that the CA field of the environment is correct. ...
doi:10.1145/304851.304860
dblp:conf/nspw/WulfWK96
fatcat:6md42wskzbhnjm2wov7lbvzbuu
BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT
2018
Computers
A federated capability-based delegation model (FCDM) is introduced to support hierarchical and multi-hop delegation. The mechanism for delegate authorization and revocation is explored. ...
Access control (AC) is among the top security concerns, which is critical in resource and information protection over IoT devices. ...
As an important factor for secure distributed systems, delegation has been recognized as one of the schemes to support access policy management in distributed computing environments [33] . ...
doi:10.3390/computers7030039
fatcat:gs5bc3ojmbexpb2lkhigisphza
Saga security system: A security architecture for open distributed systems
1999
Computer Standards & Interfaces
Security of a Saga Agent during its traversal over distributed environments is controlled by the Security Monitor integrated with the Agent. ...
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. ...
Acknowledgments We would like to thank other members of Saga Security System Project, Norihiko Kameda, Kiyoshi Une, Satoshi Yoshida, Atsuki Tomioka, Keisuke Yamaguchi, and Takeharu Kato for useful discussions ...
doi:10.1016/s0920-5489(99)92119-0
fatcat:kgdmd7766be35atl4gg3rmllke
Distributed component architectures security issues
2005
Computer Standards & Interfaces
Component architectures are the base for building such multi-tier, distributed applications. ...
This paper examines the security threats those systems must confront and the solutions proposed by the major existing component architectures. ...
Acknowledgments: The authors would like to thank Athanassios Vambakas (MSC Consultant) for his help and positive criticism on writing the .NET section. ...
doi:10.1016/j.csi.2004.08.003
fatcat:nh2y5dvwqzewhj3hv5enlrqchi
A role-based delegation framework for healthcare information systems
2002
Proceedings of the seventh ACM symposium on Access control models and technologies - SACMAT '02
As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. ...
We introduce a systematic approach to specify delegation and revocation policies using a set of rules. ...
Delegation is another important factor for secure distributed computing environment [3] . ...
doi:10.1145/507711.507731
dblp:conf/sacmat/ZhangAC02
fatcat:5ixl73zajnawbabiqpzlmhteum
« Previous
Showing results 1 — 15 out of 85,567 results