SECURITY IN OPEN NETWORKS AND DISTRIBUTED SYSTEMS

被引:5
|
作者
JANSON, P [1 ]
MOLVA, R [1 ]
机构
[1] IBM CORP, DIV RES, ZURICH RES LAB, CH-8803 RUSCHLIKON, SWITZERLAND
来源
COMPUTER NETWORKS AND ISDN SYSTEMS | 1991年 / 22卷 / 05期
关键词
NETWORK SECURITY; DISTRIBUTED SYSTEM SECURITY; NETWORK ACCESS CONTROL; DISCRETIONARY ACCESS CONTROLS; MANDATORY ACCESS CONTROLS; INTEGRITY; CONFIDENTIALITY; AUTHENTICATION; SINGLE SIGN-ON; KEY MANAGEMENT; CRYPTOGRAPHY; DES; RSA;
D O I
10.1016/0169-7552(91)90092-Q
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing pervasiveness of computer networks, security of information stored in or transported through networks, as well as security of network components and resources themselves are becoming the focus of intense concern on the part of network users and operators. This paper discusses a selection of the most popular state-of-the-art mechanisms designed to protect information, objects and other resources found in networks and distributed systems. The various techniques discussed are introduced in a bottom-up order, starting with basic cryptographic tools, then explaining how these can be exploited to achieve various forms of authentication services, and finally sketching very briefly more recent, mostly experimental developments in the area of access controls for networks and network resources. The paper is addressed to readers with a background in networks and distributed systems but little or no understanding of security issues in general, system security in networking and distributed environments in particular.
引用
收藏
页码:323 / 346
页数:24
相关论文
共 50 条
  • [31] Security of Open Radio Access Networks
    Mimran, Dudu
    Bitton, Ron
    Kfir, Yehonatan
    Klevansky, Eitan
    Brodt, Oleg
    Lehmann, Heiko
    Elovici, Yuval
    Shabtai, Asaf
    COMPUTERS & SECURITY, 2022, 122
  • [32] TOWARDS OPEN DISTRIBUTED SYSTEMS
    NETT, E
    COMPUTER COMMUNICATIONS, 1993, 16 (05) : 266 - 266
  • [33] Security on distributed systems: Cloud security versus traditional IT
    Himmel, M. Azua
    Grossman, F.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2014, 58 (01)
  • [34] Networks of open systems
    Lerman, Eugene
    JOURNAL OF GEOMETRY AND PHYSICS, 2018, 130 : 81 - 112
  • [35] Security of distributed measurement and vontrol systems
    Winiecki, Wieslaw
    Adamski, Tomasz
    Bobinski, Piotr
    Lukaszewski, Robert
    PRZEGLAD ELEKTROTECHNICZNY, 2008, 84 (05): : 220 - 227
  • [36] Strong security for distributed file systems
    Miller, E
    Long, D
    Freeman, W
    Reed, B
    CONFERENCE PROCEEDINGS OF THE 2001 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2001, : 34 - 40
  • [37] Security enhancements for distributed control systems
    Hieb, Jeffrey
    Graham, James
    Patel, Sandip
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 133 - 146
  • [38] A Security Protocol for Vehicular Distributed Systems
    Gosman, Catalin
    Dobre, Ciprian
    Cristea, Valentin
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 321 - 327
  • [39] Collaborative informatics security in distributed systems
    Ivan, Ion
    Doinea, Mihai
    Ciurea, Cristian
    Sbora, Catalin
    WSEAS Transactions on Systems, 2012, 11 (11): : 628 - 637
  • [40] Security and survivability of distributed systems: An overview
    Kyamakya, K
    Jobmann, K
    Meincke, M
    MILCOM 2000: 21ST CENTURY MILITARY COMMUNICATIONS CONFERENCE PROCEEDINGS, VOLS 1 AND 2: ARCHITECTURES & TECHNOLOGIES FOR INFORMATION SUPERIORITY, 2000, : 449 - 454