On distributed system security

Yun Bai, Haeng-kon Kim, Tai-hoon Kim

Research output: Chapter in Book / Conference PaperConference Paper

Abstract

Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains. Authorization plays an essential role to ensure the security of a wide variety of computing and IT systems such as data management systems, e-trading systems, database transaction systems, etc. This paper aims to propose a high level formal language for specifying and evaluating distributed authorizations with delegation, develop a new method for credential chain discovery, and implement a system prototype for representing and reasoning about access control policies in distributed environments. By applying the new methodology and technology developed from this work, we will be able to design highly secure computing and IT systems in many different complex problem domains.
Original languageEnglish
Title of host publicationSecTech 2008: Proceedings 2008 International Conference on Security Technology, held 13-15 December 2008, in Hainan Island, China
PublisherIEEE Computer Society
Number of pages4
ISBN (Print)9780769534862
Publication statusPublished - 2008
EventInternational Conference on Security Technology -
Duration: 1 Jan 2008 → …

Conference

ConferenceInternational Conference on Security Technology
Period1/01/08 → …

Keywords

  • distributed systems
  • logic programming
  • electronic data processing
  • access control
  • computer security
  • authorization

Fingerprint

Dive into the research topics of 'On distributed system security'. Together they form a unique fingerprint.

Cite this