A security architecture for object-based distributed systems

Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)

Abstract

Large-scale distributed systems present numerous security problems not present in local systems. We present a general security architecture for a large-scale object-based distributed system. Its main features include ways for servers to authenticate clients, clients to authenticate servers, new secure servers to be instantiated without manual intervention, and ways to restrict which client can perform which operation on which object. All of these features are done in a platform-and application-independent way, so the results are quite general. The basic idea behind the scheme is to have each object owner issue cryptographically sealed certificates to users to prove which operations they may request and to servers to prove which operations they are authorized to execute. These certificates are used to ensure secure binding and secure method invocation. The paper discusses the required certificates and security protocols for using them.

Original languageEnglish
Title of host publication18th Annual Computer Security Applications Conference, ACSAC 2002
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages161-171
Number of pages11
ISBN (Print)0-7695-1828-1
DOIs
Publication statusPublished - 9 Dec 2002
Externally publishedYes
Event18th Annual Computer Security Applications Conference, ACSAC 2002 - Las Vegas, United States
Duration: 9 Dec 200213 Dec 2002
Conference number: 18

Publication series

NameAnnual Computer Security Applications Conference, Proceedings
PublisherIEEE
Volume2002
ISSN (Print)1063-9527

Conference

Conference18th Annual Computer Security Applications Conference, ACSAC 2002
Abbreviated titleACSAC 2002
Country/TerritoryUnited States
CityLas Vegas
Period9/12/0213/12/02

Keywords

  • Access control
  • Communication system traffic control
  • Cryptographic protocols
  • Cryptography
  • Large-scale systems
  • Manuals
  • Middleware
  • Operating systems
  • Protection
  • Security

Fingerprint

Dive into the research topics of 'A security architecture for object-based distributed systems'. Together they form a unique fingerprint.

Cite this