SECURITY IN OPEN NETWORKS AND DISTRIBUTED SYSTEMS

被引:5
|
作者
JANSON, P [1 ]
MOLVA, R [1 ]
机构
[1] IBM CORP, DIV RES, ZURICH RES LAB, CH-8803 RUSCHLIKON, SWITZERLAND
来源
COMPUTER NETWORKS AND ISDN SYSTEMS | 1991年 / 22卷 / 05期
关键词
NETWORK SECURITY; DISTRIBUTED SYSTEM SECURITY; NETWORK ACCESS CONTROL; DISCRETIONARY ACCESS CONTROLS; MANDATORY ACCESS CONTROLS; INTEGRITY; CONFIDENTIALITY; AUTHENTICATION; SINGLE SIGN-ON; KEY MANAGEMENT; CRYPTOGRAPHY; DES; RSA;
D O I
10.1016/0169-7552(91)90092-Q
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing pervasiveness of computer networks, security of information stored in or transported through networks, as well as security of network components and resources themselves are becoming the focus of intense concern on the part of network users and operators. This paper discusses a selection of the most popular state-of-the-art mechanisms designed to protect information, objects and other resources found in networks and distributed systems. The various techniques discussed are introduced in a bottom-up order, starting with basic cryptographic tools, then explaining how these can be exploited to achieve various forms of authentication services, and finally sketching very briefly more recent, mostly experimental developments in the area of access controls for networks and network resources. The paper is addressed to readers with a background in networks and distributed systems but little or no understanding of security issues in general, system security in networking and distributed environments in particular.
引用
收藏
页码:323 / 346
页数:24
相关论文
共 50 条
  • [1] SECURITY IN OPEN SYSTEMS NETWORKS
    RADACK, SM
    COMPUTER STANDARDS & INTERFACES, 1990, 10 (03) : 213 - 218
  • [2] Security in computer networks and distributed systems
    Prabhu, MM
    Raghavan, SV
    COMPUTER COMMUNICATIONS, 1996, 19 (05) : 379 - 388
  • [3] SESAME - THE SOLUTION TO SECURITY FOR OPEN DISTRIBUTED SYSTEMS
    KAIJSER, P
    PARKER, T
    PINKAS, D
    COMPUTER COMMUNICATIONS, 1994, 17 (07) : 501 - 518
  • [4] The Saga Security System: A security architecture for open distributed systems
    Soshi, M
    Maekawa, M
    PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 53 - 58
  • [5] Security, trust, and resilience of distributed networks and systems
    Su, Jinshu
    Wang, Xiaofeng
    Shi, Weisong
    Ray, Indrakshi
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (10) : 1829 - 1830
  • [6] Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
    Gritzalis, S
    Spinellis, D
    Georgiadis, P
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 697 - 709
  • [7] A Security Gateway for power distribution systems in open networks
    Andrade, Eduardo
    Granjal, Jorge
    Vilela, Joao P.
    Arantes, Carlos
    COMPUTERS & SECURITY, 2021, 111
  • [8] Clusters and security: Distributed security for distributed systems
    Pourzandi, M
    Gordon, D
    Yurcik, W
    Koenig, GA
    2005 IEEE International Symposium on Cluster Computing and the Grid, Vols 1 and 2, 2005, : 96 - 104
  • [9] Dealing with multi-policy security in large open distributed systems
    Bidan, C
    Issarny, V
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 51 - 66
  • [10] SECURITY FOR DISTRIBUTED SYSTEMS
    TRUEMAN, P
    DATA PROCESSING, 1986, 28 (04): : 187 - 190