The Saga Security System: A security architecture for open distributed systems

被引:1
|
作者
Soshi, M
Maekawa, M
机构
关键词
D O I
10.1109/FTDCS.1997.644703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The authorization model in Saga Security System (Saga authorization model) supports the novel concept of a service path and provides uniform and flexible protection appropriate for advanced computational models such as object-oriented systems and cooperative agent systems. With respect to the security mechanism of Saga Security System, its key features are an access token and a Security Monitor. Access tokens are implemented using public key technology and ensure integrity of request messages issued by Saga Agents. In addition, we can regard the Security Monitor of a Saga Agent as a reference monitor for the Agent. Security of a Saga Agent during its traversal over distributed environments is controlled by the Security Monitor integrated with the Agent.
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [1] SECURITY ARCHITECTURE FOR DISTRIBUTED SYSTEMS
    MUFTIC, S
    SLOMAN, M
    COMPUTER COMMUNICATIONS, 1994, 17 (07) : 492 - 500
  • [2] SECURITY IN OPEN NETWORKS AND DISTRIBUTED SYSTEMS
    JANSON, P
    MOLVA, R
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1991, 22 (05): : 323 - 346
  • [3] Open Security System for Cloud Architecture
    Koushik, S.
    Patil, Annapurna P.
    ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 467 - 471
  • [4] Inter-enterprise contract architecture for open distributed systems: Security requirements
    Milosevic, Z
    Arnold, D
    OConnor, L
    PROCEEDINGS OF THE 5TH WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '96), 1996, : 68 - 73
  • [5] Security architecture for heterogeneous distributed computing systems
    Naqvi, S
    Riguidel, M
    38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 34 - 41
  • [6] SESAME - THE SOLUTION TO SECURITY FOR OPEN DISTRIBUTED SYSTEMS
    KAIJSER, P
    PARKER, T
    PINKAS, D
    COMPUTER COMMUNICATIONS, 1994, 17 (07) : 501 - 518
  • [7] Security architecture for distributed system based on firewall
    Xie, Dongqing
    Qi, Ke
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 1999, 26 (06): : 97 - 102
  • [8] Clusters and security: Distributed security for distributed systems
    Pourzandi, M
    Gordon, D
    Yurcik, W
    Koenig, GA
    2005 IEEE International Symposium on Cluster Computing and the Grid, Vols 1 and 2, 2005, : 96 - 104
  • [9] The security architecture of the Java']Java operating system JX -: A security architecture for distributed parallel computing
    Wawersich, C
    Felser, M
    Golm, M
    Kleinöder, J
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2003, 2834 : 85 - 95
  • [10] A distributed architecture for online power systems security analysis
    Di Santo, M
    Vaccaro, A
    Villacci, D
    Zimeo, E
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2004, 51 (06) : 1238 - 1248