2000
DOI: 10.1007/10719994_19
|View full text |Cite
|
Sign up to set email alerts
|

A Security Design for a Wide-Area Distributed System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2002
2002
2007
2007

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Because security was not covered in the original Globe design, no interfaces are defined for the security subobject. A preliminary security design evalua-tion [128] suggests providing two additional security interfaces-secComm and secRepl-for interaction with the communication and replication subobjects.…”
Section: Security Subobject Interfacesmentioning
confidence: 99%
“…Because security was not covered in the original Globe design, no interfaces are defined for the security subobject. A preliminary security design evalua-tion [128] suggests providing two additional security interfaces-secComm and secRepl-for interaction with the communication and replication subobjects.…”
Section: Security Subobject Interfacesmentioning
confidence: 99%
“…The security subobject [8] is responsible for enforcing the object's security policy at the local representative level. This is done by having the security subobject mediating the communication flow between the other local subobjects.…”
Section: Ai A2mentioning
confidence: 99%
“…The control subobject's job is to take care of invocations from client processes on the host where the local object resides and to mediate the interaction between the semantics subobject and the replication subobject. It is comparable to a skeleton stub in object adaptors [24] The security subobject [17] is responsible for enforcing the DSO's security policy at the level of local objects by mediating the communication flow between the other local subobjects.…”
Section: The Globe Systemmentioning
confidence: 99%
“…Finally, in the third step, selected measures are to be implemented and evaluated. The first stage has been already completed, and the resulting document [17] can be seen as a specification of all security functions that could be incorporated in Globe applications. This paper deals with the second stage, and we are using it as a specification document for our prototype implementation.…”
Section: Security Issues In Globementioning
confidence: 99%
See 1 more Smart Citation