The Saga Security System: A security architecture for open distributed systems

被引:1
|
作者
Soshi, M
Maekawa, M
机构
关键词
D O I
10.1109/FTDCS.1997.644703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The authorization model in Saga Security System (Saga authorization model) supports the novel concept of a service path and provides uniform and flexible protection appropriate for advanced computational models such as object-oriented systems and cooperative agent systems. With respect to the security mechanism of Saga Security System, its key features are an access token and a Security Monitor. Access tokens are implemented using public key technology and ensure integrity of request messages issued by Saga Agents. In addition, we can regard the Security Monitor of a Saga Agent as a reference monitor for the Agent. Security of a Saga Agent during its traversal over distributed environments is controlled by the Security Monitor integrated with the Agent.
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [21] An Open Architecture Framework for Safety and Security
    Bikar, Patrick
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOPS, VOLS 1 AND 2, 2009, : 557 - 561
  • [22] Security Architecture for Open Collaborative Environment
    Demchenko, Y
    Gommans, L
    de Laat, C
    Oudenaarde, B
    Tokmakoff, A
    Snijders, M
    van Buuren, R
    ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 589 - 599
  • [23] Security applications and architecture for an open market
    Hirsch, P
    Lee, S
    IEEE COMPUTER APPLICATIONS IN POWER, 1999, 12 (03): : 26 - 31
  • [24] Architecture of distributed network processors: Specifics of application in information security systems
    Zaborovskii, VS
    Shemanin, YA
    Rudskoy, A
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 681 - 688
  • [25] SECURITY IN OPEN DISTRIBUTED-PROCESSING
    SIUDA, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 249 - 266
  • [26] A security architecture for reputation systems
    Ismail, R
    Boyd, C
    Josang, A
    Russell, S
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 176 - 185
  • [27] SECURITY PROBLEMS IN DISTRIBUTED SYSTEMS
    Hasanova, N. A.
    Alizade, U. M.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2018, : 144 - 146
  • [28] SECURITY, OSI AND DISTRIBUTED SYSTEMS
    KNOWLES, T
    INFORMATION AGE, 1988, 10 (02): : 79 - 84
  • [29] Modeling security in distributed systems
    Riess, H.P.
    Proceedings of the IFIP International Conference on Computer Security and Information Integrity in Our Changing World, 1991,
  • [30] BLOCKCHAIN FOR DISTRIBUTED SYSTEMS SECURITY
    Rehmani, Mubashir Husain
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (06)