Filters








85,567 Hits in 3.7 sec

Practical delegation for secure distributed object environments

Nataraj Nagaratnam, Doug Lea
1998 Distributed Systems Engineering  
Libraries Privacy Policy (Version 2.0) Updated October 4, 2013 PERSONAL SECURITY Users share in the responsibility for ensuring that their personal information is adequately protected.  ...  When using the Libraries' computers, users must keep their University Information secure from unauthorized access by keeping their password secret.  ...  Except for Business Transactions, if a Libraries staff member or affiliated Libraries service (including an online database) requests your social security number, please contact the Director of the Libraries  ... 
doi:10.1088/0967-1846/5/4/004 fatcat:vdlk5xgehfhd3fudfv4dpgtbaq

Design of a Security Management Middleware in Ubiquitous Computing Environments

Zhefan Jiang, Kanghee x Kanghee Lee, Sangok Kim, Hyunchul Bae, Sangwook Kim, Soongju Kang
2005 Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05)  
It also provides management services which can monitor and control the managed objects and sensors for the domain security management.  ...  In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-centric security.  ...  In CASA, they proposed secure service architecture for context-aware environments.  ... 
doi:10.1109/pdcat.2005.120 dblp:conf/pdcat/JiangLKBKK05 fatcat:4xzvvk4il5dhzcbop64hi5fgu4

Security Issues in a Mobile Computing Paradigm [chapter]

I. Mavridis, G. Pangalos
1997 IFIP Advances in Information and Communication Technology  
In this paper, we discuss operational and security issues arising from the use of mobile components in distributed systems.  ...  Mobile computing is tightly depending on available infrastructure of distributed systems. As a result, we can see it as an extension of distributed systems computing.  ...  Mobile agents We use mobile agents to provide a paradigm for distributed object computing, encompassing synchrony and asynchrony, message-passing and object-passing, and stationary objects and mobile objects  ... 
doi:10.1007/978-0-387-35256-5_5 fatcat:usqrbl2q7betfas643qynlpx5y

Dynamic Access Control for Ubiquitous Environments [chapter]

Jehan Wickramasuriya, Nalini Venkatasubramanian
2004 Lecture Notes in Computer Science  
This paper presents a domain-based approach to access control in distributed environments with mobile, distributed objects and nodes.  ...  Combining access control requirements and multilevel security with mobile and contextual requirements of active objects allow us to re-evaluate security considerations for mobile objects.  ...  In increasing the number of objects we used a fixed number of mobile nodes, 4 security levels and a random distribution for migrating the objects.  ... 
doi:10.1007/978-3-540-30469-2_49 fatcat:c7lrx3quyvehhdfxzoqleoojgy

Distributed Object Systems Security [chapter]

Vijay Varadharajan
1995 IFIP Advances in Information and Communication Technology  
In this paper, we consider a distributed object environment, and describe how security services and mechanisms can be provided.  ...  .), Information Security -the Next Decade © IFIP International Federation for Information Processing 1995  ...  Introduction Security plays a vital role in the design, development and practical use of the distributed computing environment, for greater availability and access to information in turn imply that distributed  ... 
doi:10.1007/978-0-387-34873-5_23 fatcat:apw4qosh2velnkkiwsfofwkfne

Efficient and Secure Information Sharing in Distributed, Collaborative Environments [chapter]

Partha Dasgupta, Vijay Karamcheti, Zvi M. Kedem
2000 Communication-Based Systems  
secure, efficient, and satisfy specified access constraints.  ...  In addition, they improve overall efficiency by permitting migration of computations to, and caching of services in, partly trusted environments of another organization.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright annotation thereon.  ... 
doi:10.1007/978-94-015-9608-4_12 fatcat:detesqk4zjd3lc24mayy26dl3e

Role-based Protection and Delegation for Mobile Object Environments [chapter]

Nataraj Nagaratnam, Doug Lea
1998 Lecture Notes in Computer Science  
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a network to accomplish  ...  The framework supports a control API for application developers to specify mechanisms and security policies.  ...  The proposed protection model is a simple and natural extension of the current Java security architecture and is proposed for distributed Java environments.  ... 
doi:10.1007/3-540-49255-0_74 fatcat:vbibo3rofneavdqhrd26fwnnsi

Enhanced Information Security in Distributed Mobile System Based on Delegate Object Model

N. Shenbagavadivu, S. Usha Savithri
2012 Procedia Engineering  
The main objective of this paper is to provide secured transaction in Mobile system based on delegate object model.  ...  Security algorithms used for wired networks cannot be applied to wireless systems, since wireless network clients come with limited resources and processing power. .  ...  The structure of a distributed mobile system with delegate object is as shown in Figure 2 . 4.1Object-Access Level Security Object-access level security, which could control access to objects  Read  ... 
doi:10.1016/j.proeng.2012.01.927 fatcat:fs4dn4icjjh5jbad2qmn36b2rm

Toward Realizable Restricted Delegation in Computational Grids1 [chapter]

Geoff Stoker, Brian S. White, Ellen Stackpole, T. J. Highley, Marty Humphrey
2001 Lecture Notes in Computer Science  
Challenges include determining the rights to delegate and easily implementing such delegation. Approaches are discussed in the context of Legion, an object-based infrastructure for Grids.  ...  Each approach is suited for different situations and objectives.  ...  Erdos and Pato present an architecture for implementing delegation in the Distributed Computing Environment (DCE) [3] .  ... 
doi:10.1007/3-540-48228-8_4 fatcat:25toqxh5cfbmhdi52ajajeqgny

A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing

Tao Huang, Zhiyong Zhang, Qingli Chen, Yanan Chang
2013 International Journal of Digital Content Technology and its Applications  
environment.  ...  high security terminal platforms, ensures bidirectional trust relation between the multimedia contents providers and the end users, and meanwhile satisfies the basic privacy protection and security requirement  ...  Ours Secure distribution of Digital contents Contents encryption Contents encryption Contents encryption Contents encryption AP 2 RA remote attestation Secure distribution of  ... 
doi:10.4156/jdcta.vol7.issue4.95 fatcat:zcua5f5is5cxtcppv7zfuziuqu

A new model of security for distributed systems

Wm A. Wulf, Chenxi Wang, Darrell Kienzle
1996 Proceedings of the 1996 workshop on New security paradigms - NSPW '96  
With the rapid growth of the information age, open distributed systems have become increasingly popular. The need for protection and security in a distributed environment has never been greater.  ...  The conventional approach to security has been to enforce a system-wide policy, but this approach will not work for large distributed systems where entirely new security issues and concerns are emerging  ...  an object might trust that the CA field of the environment is correct.  ... 
doi:10.1145/304851.304860 dblp:conf/nspw/WulfWK96 fatcat:6md42wskzbhnjm2wov7lbvzbuu

BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT

Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen
2018 Computers  
A federated capability-based delegation model (FCDM) is introduced to support hierarchical and multi-hop delegation. The mechanism for delegate authorization and revocation is explored.  ...  Access control (AC) is among the top security concerns, which is critical in resource and information protection over IoT devices.  ...  As an important factor for secure distributed systems, delegation has been recognized as one of the schemes to support access policy management in distributed computing environments [33] .  ... 
doi:10.3390/computers7030039 fatcat:gs5bc3ojmbexpb2lkhigisphza

Saga security system: A security architecture for open distributed systems

Masakazu Soshi, Mamoru Maekawa
1999 Computer Standards & Interfaces  
Security of a Saga Agent during its traversal over distributed environments is controlled by the Security Monitor integrated with the Agent.  ...  In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent.  ...  Acknowledgments We would like to thank other members of Saga Security System Project, Norihiko Kameda, Kiyoshi Une, Satoshi Yoshida, Atsuki Tomioka, Keisuke Yamaguchi, and Takeharu Kato for useful discussions  ... 
doi:10.1016/s0920-5489(99)92119-0 fatcat:kgdmd7766be35atl4gg3rmllke

Distributed component architectures security issues

Giorgos Gousios, Efthimia Aivaloglou, Stefanos Gritzalis
2005 Computer Standards & Interfaces  
Component architectures are the base for building such multi-tier, distributed applications.  ...  This paper examines the security threats those systems must confront and the solutions proposed by the major existing component architectures.  ...  Acknowledgments: The authors would like to thank Athanassios Vambakas (MSC Consultant) for his help and positive criticism on writing the .NET section.  ... 
doi:10.1016/j.csi.2004.08.003 fatcat:nh2y5dvwqzewhj3hv5enlrqchi

A role-based delegation framework for healthcare information systems

Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu
2002 Proceedings of the seventh ACM symposium on Access control models and technologies - SACMAT '02  
As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries.  ...  We introduce a systematic approach to specify delegation and revocation policies using a set of rules.  ...  Delegation is another important factor for secure distributed computing environment [3] .  ... 
doi:10.1145/507711.507731 dblp:conf/sacmat/ZhangAC02 fatcat:5ixl73zajnawbabiqpzlmhteum
« Previous Showing results 1 — 15 out of 85,567 results