کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
432738 689058 2013 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Object protection in distributed systems
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Object protection in distributed systems
چکیده انگلیسی

With reference to a distributed system consisting of nodes connected by a local area network, we consider a salient aspect of the protection problem, the representation of access permissions and protection domains. We present a model of a protection system supporting typed objects. Possession of an access permission for a given object is certified by possession of an object pointer including the specification of a set of access rights. We associate an encryption key with each object and a password with each domain. Object pointers are stored in memory in a ciphertext form obtained by using the object key and including the value of the domain password. Each process is executed in a domain and can take advantage of a given object pointer only if this object pointer was encrypted by including the password of this domain. A set of protection primitives makes it possible to use object pointers for object reference and to control the movements of the objects across the network. The resulting protection environment is evaluated from a number of salient viewpoints, including ease of access right distribution and revocation, interprocess interaction and cooperation, protection against fraudulent actions of access right manipulation and stealing, storage overhead, and network traffic.


► We refer to a distributed system consisting of nodes connected by a local area network.
► We consider the representation of access permissions and protection domains.
► Our approach is based on the application of techniques of symmetric-key cryptography.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Parallel and Distributed Computing - Volume 73, Issue 5, May 2013, Pages 570–579
نویسندگان
,