With reference to a distributed system consisting of nodes connected by a local area network, we consider the problems related to the distribution, verification, review and revocation of access permissions. We propose the organization of a protection system that takes advantage of a form of protected pointer, the handle, to reference clusters of segments allocated in the same node. A handle is expressed in terms of a selector and a password. The selector specifies the segments, the password specifies an access right, read or write. Two primary passwords are associated with each cluster, corresponding to an access permission for all the segments in that cluster. A handle weakening algorithm takes advantage of a parametric one-way function to...
We consider the problem of access privilege management in a classical protection environment featuri...
As more services move on to the web and more people use the cloud for storage of important informati...
This paper considers the security issue of practical distributed storage systems (DSSs) which consis...
With reference to a distributed system consisting of nodes connected by a local area network, we con...
With reference to a distributed environment consisting of nodes connected in an arbitrary network to...
With reference to a distributed architecture consisting of sensor nodes connected in a wireless netw...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
A salient aspect of protection system design is the set of the mechanisms for the representation, di...
With reference to a distributed system consisting of nodes connected by a local area network, we pr...
With reference to a distributed architecture consisting of sensor nodes connected by wireless link...
With reference to a protection system featuring active subjects that attempt to access passive, type...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
This paper focuses on memory addressing environments that support the notion of a single address sp...
A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstand...
We consider the problem of access privilege management in a classical protection environment featuri...
As more services move on to the web and more people use the cloud for storage of important informati...
This paper considers the security issue of practical distributed storage systems (DSSs) which consis...
With reference to a distributed system consisting of nodes connected by a local area network, we con...
With reference to a distributed environment consisting of nodes connected in an arbitrary network to...
With reference to a distributed architecture consisting of sensor nodes connected in a wireless netw...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
A salient aspect of protection system design is the set of the mechanisms for the representation, di...
With reference to a distributed system consisting of nodes connected by a local area network, we pr...
With reference to a distributed architecture consisting of sensor nodes connected by wireless link...
With reference to a protection system featuring active subjects that attempt to access passive, type...
Abstract — The complexity of today's distributed computing environment is such that the presenc...
This paper focuses on memory addressing environments that support the notion of a single address sp...
A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstand...
We consider the problem of access privilege management in a classical protection environment featuri...
As more services move on to the web and more people use the cloud for storage of important informati...
This paper considers the security issue of practical distributed storage systems (DSSs) which consis...