The Saga Security System: A security architecture for open distributed systems

被引:1
|
作者
Soshi, M
Maekawa, M
机构
关键词
D O I
10.1109/FTDCS.1997.644703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The authorization model in Saga Security System (Saga authorization model) supports the novel concept of a service path and provides uniform and flexible protection appropriate for advanced computational models such as object-oriented systems and cooperative agent systems. With respect to the security mechanism of Saga Security System, its key features are an access token and a Security Monitor. Access tokens are implemented using public key technology and ensure integrity of request messages issued by Saga Agents. In addition, we can regard the Security Monitor of a Saga Agent as a reference monitor for the Agent. Security of a Saga Agent during its traversal over distributed environments is controlled by the Security Monitor integrated with the Agent.
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [31] MODELING SECURITY IN DISTRIBUTED SYSTEMS
    RIESS, HP
    COMPUTER SECURITY AND INFORMATION INTEGRITY, 1991, : 371 - 381
  • [32] Dealing with multi-policy security in large open distributed systems
    Bidan, C
    Issarny, V
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 51 - 66
  • [33] Security for the NAMUR Open Architecture Part 2: The NOA Security Demonstrator
    Runde, Markus
    Barth, Christian
    Becker, Ronny
    ATP MAGAZINE, 2022, (1-2): : 68 - 76
  • [34] SECURITY IN OPEN SYSTEMS NETWORKS
    RADACK, SM
    COMPUTER STANDARDS & INTERFACES, 1990, 10 (03) : 213 - 218
  • [35] STANDARDS FOR SECURITY IN OPEN SYSTEMS
    FORD, WS
    DALLAS GLOBECOM 89, VOLS 1-3: COMMUNICATIONS TECHNOLOGY FOR THE 1990S AND BEYOND, 1989, : 222 - 225
  • [36] Cyber security in open systems
    Jones, A
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 133 - 135
  • [37] INFORMATION SECURITY IN OPEN SYSTEMS
    KREUTZ, H
    ELECTRONIC INFORMATION SYSTEMS: REALIZATION, CHOICES AND USE, 1989, : 91 - 100
  • [38] Information security in open systems
    Karila, Arto
    Information Network and Data Communication, 1992,
  • [39] INFORMATION SECURITY IN OPEN SYSTEMS
    KARILA, A
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 6 : 459 - 478
  • [40] Cyber Security - Security strategy for distribution management system and security architecture considerations
    Vittor, Timothy R.
    Sukumara, T.
    Sudarsan, S. D.
    Starck, Janne
    2017 70TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS (CPRE), 2017,