On distributed system security

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

1 Citation (Scopus)

Abstract

Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains.

Original languageEnglish
Title of host publicationProceedings - 2008 International Conference on Security Technology, SecTech 2008
Pages54-57
Number of pages4
DOIs
Publication statusPublished - 2008
Event2008 International Conference on Security Technology, SecTech 2008 - Hainan Island, China
Duration: 13 Dec 200815 Dec 2008

Publication series

NameProceedings - 2008 International Conference on Security Technology, SecTech 2008

Conference

Conference2008 International Conference on Security Technology, SecTech 2008
Country/TerritoryChina
CityHainan Island
Period13/12/0815/12/08

Keywords

  • Authorization
  • Distributed systems
  • Formal specification
  • Logic program

Fingerprint

Dive into the research topics of 'On distributed system security'. Together they form a unique fingerprint.

Cite this