2001
DOI: 10.21236/ada440577
|View full text |Cite
|
Sign up to set email alerts
|

Credentialed Secure Communication Switchboards""

Abstract: Software development in distributed computation is complicated by the extra overhead of communication between connected, dispersed hosts in dynamically changing, multiple administrative domains. Many disparate technologies exist for trust management, authentication, secure communication channels, and service discovery, but composing all of these elements into a single system can outweigh principal development efforts.The NYU Disco Switchboard consolidates these connectivity issues into a single convenient, ext… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2001
2001
2007
2007

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Advanced role-based access control systems, such as GRBAC [2] and dRBAC [9], and lawgoverned interaction [15], provide more expressive and flexible policy-based access control than traditional ACLs and capabilities, but do not handle conflicts and disagreements, where negotiation would be required.…”
Section: Related Workmentioning
confidence: 99%
“…Advanced role-based access control systems, such as GRBAC [2] and dRBAC [9], and lawgoverned interaction [15], provide more expressive and flexible policy-based access control than traditional ACLs and capabilities, but do not handle conflicts and disagreements, where negotiation would be required.…”
Section: Related Workmentioning
confidence: 99%
“…Switchboard The Switchboard [7] library provides a trusted substrate for secure and authorized inter-component communication. Switchboard coalition partnerships are secure, authenticated, continuously authorized connections whose communication channels are monitored when the communication channel uses an external network.…”
Section: Authorization-and Liveness-aware Inter-component Communicationmentioning
confidence: 99%
“…The design of some of the underlying abstractions have been described in detail elsewhere [6,7], but not as part of a larger system. Our goal in this paper is to describe the overall DisCo application model, the set of abstractions we believe are necessary to support this model conveniently, and the lessons we have learned from developing applications on top of this middleware.…”
Section: Introductionmentioning
confidence: 99%
“…DisCo also includes a novel abstraction called the Switchboard, which provides applications with the ability to create credentialed, secure connections with the same programming effort as might be required in a completely secure environment. The overall DisCo architecture and the Switchboard abstraction are described in additional detail elsewhere [9,10].…”
Section: Sponsoring/monitoring Agency Name(s) and Address(es) 10 Spomentioning
confidence: 99%
“…We have implemented a centralized dRBAC system that responds to trust-relationship queries generated by our DisCo infrastructure. Our current implementation is Java-based and uses Java RMI (Remote Method Invocation) and secure sockets implemented using our Switchboard [10] abstraction for inter-host communication. We are in the process of developing a distributed implementation of dRBAC.…”
Section: Implementation Statusmentioning
confidence: 99%