iii iv Traditional access control models which rely on a centralized reference monitor are not well suited for large-scale distributed systems. Cryptographic access control is a decentralized model, where access control is enforced solely based on possession of cryptographic keys. By including this access control scheme directly at the inter-process communication level, a distributed system can be created, where the confidentiality and integrity of all communication is built in by default, and where only authorized nodes are granted access to the system's assets. This thesis therefore investigates the possibilities of incorporating the cryp-tographic access control model into the Remote Procedure Call (RPC) protocol. RPC is an inter-pr...
Remote procedure call (RPC) is a widely used communication mechanism in local network-based distribu...
Typical high-performance distributed applications con-sist of clients accessing computational and in...
An RPC implementation is described which uses a small network of Transputers as a parallel front end...
Remote Procedure Call (RPC) is a useful model for providing communication across a network between p...
In a distributed system, Remote Procedure Calls (RPCs) enable clients to invoke services offered by ...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected res...
A remote procedure call mechanism (RPC) is a facility which enables a process to call a procedure in...
Abstract: Security based on cryptographic techniques is commonly used in many applications from many...
Remote procedure call (RPC) is a simple yet powerful primitiv~ for communication and synchronization...
Remote procedure call (RPC) and shared variable are communication abstractions which allow the vario...
Remote Procedure Call (RPC) is a simple yet powerful primitive for communication and synchronization...
The use of abstractions in the analysis of distributed computer systems permits to focus on the main...
The problems of identity management inherent in distributed subscription-based resource sharing are ...
Lightweight Remote Procedure Call (LRPC) is a communication facility designed and optimized for comm...
We present a new access control mechanism for P2P networks with distributed enforcement, called P2P ...
Remote procedure call (RPC) is a widely used communication mechanism in local network-based distribu...
Typical high-performance distributed applications con-sist of clients accessing computational and in...
An RPC implementation is described which uses a small network of Transputers as a parallel front end...
Remote Procedure Call (RPC) is a useful model for providing communication across a network between p...
In a distributed system, Remote Procedure Calls (RPCs) enable clients to invoke services offered by ...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected res...
A remote procedure call mechanism (RPC) is a facility which enables a process to call a procedure in...
Abstract: Security based on cryptographic techniques is commonly used in many applications from many...
Remote procedure call (RPC) is a simple yet powerful primitiv~ for communication and synchronization...
Remote procedure call (RPC) and shared variable are communication abstractions which allow the vario...
Remote Procedure Call (RPC) is a simple yet powerful primitive for communication and synchronization...
The use of abstractions in the analysis of distributed computer systems permits to focus on the main...
The problems of identity management inherent in distributed subscription-based resource sharing are ...
Lightweight Remote Procedure Call (LRPC) is a communication facility designed and optimized for comm...
We present a new access control mechanism for P2P networks with distributed enforcement, called P2P ...
Remote procedure call (RPC) is a widely used communication mechanism in local network-based distribu...
Typical high-performance distributed applications con-sist of clients accessing computational and in...
An RPC implementation is described which uses a small network of Transputers as a parallel front end...