On distributed system security

Yun Bai, Haeng-kon Kim, Tai-hoon Kim

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains. Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains.]]
    Original languageEnglish
    Title of host publicationSecTech 2008: Proceedings 2008 International Conference on Security Technology, held 13-15 December 2008, in Hainan Island, China
    PublisherIEEE Computer Society
    Number of pages4
    ISBN (Print)9780769534862
    Publication statusPublished - 2008
    EventInternational Conference on Security Technology -
    Duration: 1 Jan 2008 → …

    Conference

    ConferenceInternational Conference on Security Technology
    Period1/01/08 → …

    Keywords

    • distributed systems
    • logic programming
    • electronic data processing
    • access control
    • computer security
    • authorization

    Fingerprint

    Dive into the research topics of 'On distributed system security'. Together they form a unique fingerprint.

    Cite this