SECURITY IN OPEN NETWORKS AND DISTRIBUTED SYSTEMS

被引:5
|
作者
JANSON, P [1 ]
MOLVA, R [1 ]
机构
[1] IBM CORP, DIV RES, ZURICH RES LAB, CH-8803 RUSCHLIKON, SWITZERLAND
来源
COMPUTER NETWORKS AND ISDN SYSTEMS | 1991年 / 22卷 / 05期
关键词
NETWORK SECURITY; DISTRIBUTED SYSTEM SECURITY; NETWORK ACCESS CONTROL; DISCRETIONARY ACCESS CONTROLS; MANDATORY ACCESS CONTROLS; INTEGRITY; CONFIDENTIALITY; AUTHENTICATION; SINGLE SIGN-ON; KEY MANAGEMENT; CRYPTOGRAPHY; DES; RSA;
D O I
10.1016/0169-7552(91)90092-Q
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever increasing pervasiveness of computer networks, security of information stored in or transported through networks, as well as security of network components and resources themselves are becoming the focus of intense concern on the part of network users and operators. This paper discusses a selection of the most popular state-of-the-art mechanisms designed to protect information, objects and other resources found in networks and distributed systems. The various techniques discussed are introduced in a bottom-up order, starting with basic cryptographic tools, then explaining how these can be exploited to achieve various forms of authentication services, and finally sketching very briefly more recent, mostly experimental developments in the area of access controls for networks and network resources. The paper is addressed to readers with a background in networks and distributed systems but little or no understanding of security issues in general, system security in networking and distributed environments in particular.
引用
收藏
页码:323 / 346
页数:24
相关论文
共 50 条
  • [41] Analyzing security in distributed collaborative systems
    Gantenbein, RE
    James, TL
    DeGroot, G
    Allen, HL
    Shin, SY
    COMPUTERS AND THEIR APPLICATIONS, 2000, : 72 - 75
  • [42] Security enhancements for distributed control systems
    Hieb, Jeffrey
    Graham, James
    Patel, Sandip
    IFIP Advances in Information and Communication Technology, 2008, 253 : 133 - 146
  • [43] Security and privacy in collaborative distributed systems
    Yau, SS
    Bonatti, PA
    Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 267 - 267
  • [44] Assessment of Security Systems Complex Networks security
    Iskhakov, S. Yu.
    Shelupanov, A. A.
    Mescheryakov, R. V.
    2014 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2014,
  • [45] Security and Privacy of Distributed Online Social Networks
    Boshrooyeh, Sanaz Taheri
    Kupcu, Alptekin
    Ozkasap, Oznur
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2015, : 112 - 119
  • [46] Design of distributed sensor networks for security and defense
    Karakehayov, Z
    CYBERSPACE SECURITY AND DEFENSE: RESEARCH ISSUES, 2005, 196 : 177 - 192
  • [47] Security and privacy for distributed multimedia sensor networks
    Kundur, Deepa
    Luh, William
    Okorafor, Unoma Ndili
    Zourntos, Takis
    PROCEEDINGS OF THE IEEE, 2008, 96 (01) : 112 - 130
  • [48] ON PRIVACY AND SECURITY IN DISTRIBUTED VISUAL SENSOR NETWORKS
    Czarlinska, Alexandra
    Luh, William
    Kundur, Deepa
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 1692 - 1695
  • [49] ENHANCING THE SECURITY OF NETWORKS AND SYSTEMS
    PEUCKERT, H
    SIEMENS REVIEW, 1991, : 19 - 22
  • [50] Introduction to IT-security in open systems
    Jerman-Blazic, B
    Schneider, W
    Schwiderski-Grosche, S
    ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 3 - 19