The Saga Security System: A security architecture for open distributed systems

被引:1
|
作者
Soshi, M
Maekawa, M
机构
关键词
D O I
10.1109/FTDCS.1997.644703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The authorization model in Saga Security System (Saga authorization model) supports the novel concept of a service path and provides uniform and flexible protection appropriate for advanced computational models such as object-oriented systems and cooperative agent systems. With respect to the security mechanism of Saga Security System, its key features are an access token and a Security Monitor. Access tokens are implemented using public key technology and ensure integrity of request messages issued by Saga Agents. In addition, we can regard the Security Monitor of a Saga Agent as a reference monitor for the Agent. Security of a Saga Agent during its traversal over distributed environments is controlled by the Security Monitor integrated with the Agent.
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [41] Security Foundation for a Distributed Cabin Core Architecture
    Kuntze, Nicolai
    Rudolph, Carsten
    Hanka, Oliver
    2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,
  • [42] An intelligent security architecture for distributed firewalling environments
    De Santis, Alfredo
    Castiglione, Aniello
    Fiore, Ugo
    Palmieri, Francesco
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (02) : 223 - 234
  • [43] TiTiMaKe: A Distributed Service Architecture for Security Applications
    Ronkko, Mauno
    Stocker, Markus
    Huttunen, Markku
    Kotovirta, Ville
    Kolehmainen, Mikko
    ENVIRONMENTAL SOFTWARE SYSTEMS: FOSTERING INFORMATION SHARING, 2013, 413 : 381 - 390
  • [44] An intelligent security architecture for distributed firewalling environments
    Alfredo De Santis
    Aniello Castiglione
    Ugo Fiore
    Francesco Palmieri
    Journal of Ambient Intelligence and Humanized Computing, 2013, 4 : 223 - 234
  • [45] Security at the Network Edge: A distributed firewall architecture
    Markham, T
    Payne, C
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 279 - 286
  • [46] Remote method security in a distributed processing architecture supporting generic security objects
    Taylor, Bradley D.
    Muftic, Sead
    Instrum Control Autom Power Ind, Proc, 1600, ISA 421 (253-267):
  • [47] The distributed monitor system for security and stability in the complicated power systems
    Zhou, BX
    Teng, FS
    POWERCON '98: 1998 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY - PROCEEDINGS, VOLS 1 AND 2, 1998, : 1364 - 1368
  • [48] Open system security standards
    Reitenspiess, Manfred
    Computers and Security, 1993, 12 (04): : 341 - 361
  • [49] Enhancing security functionality on Open Router Architecture
    Aoki, M
    Hamano, T
    Miyasaka, T
    Ogawa, K
    Inami, M
    Habara, K
    Chaki, S
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 17 - 23
  • [50] The Flask security architecture: System support for diverse security policies
    Spencer, R
    Smalley, S
    Loscocco, P
    Hibler, M
    Andersen, D
    Lepreau, J
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 123 - 139