Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new security issues, caused by the complexity of the operating environment. In particular, policies at multiple layers and locations force conventional mechanisms such as firewalls and compartmented file storage into roles where they are clumsy and failure-prone. Our approach relies on two functional divisions. First, we split policy specification and policy enforcement, providing local autonomy within the constraints of the global security policy. Second, we create virtual security domains each with its own security policy. Every domain has an associated set of privileges ...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Nowadays, various promising paradigms of distributed computing over the Internet, such as Grids, P2P...
Virtual Private Network technology allows remote network users to benefit from resources on a privat...
Large scale distributed applications combine network access with multiple storage and computational ...
Large scale distributed applications such as electronic commerce and online marketplaces combine net...
The design principle of maximizing local autonomy except when it conflicts with global robustness ha...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
AbstractState-of-the-art security mechanisms are often enforced in isolation from each other, which ...
A large extent of today's computer programs is distributed. For instance, services for backups, fil...
Private access to corporate servers from Internet can be achieved using various security mechanisms....
Maximizing local autonomy by delegating functionality to end nodes when possible (the end-to-end des...
The design principle of restricting local autonomy only where necessary for global robustness has le...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
The design principle of restricting local autonomy only where necessary for global robustness has le...
In a ubiquitous computing environment, devices host services that are accessed by anonymous users. T...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Nowadays, various promising paradigms of distributed computing over the Internet, such as Grids, P2P...
Virtual Private Network technology allows remote network users to benefit from resources on a privat...
Large scale distributed applications combine network access with multiple storage and computational ...
Large scale distributed applications such as electronic commerce and online marketplaces combine net...
The design principle of maximizing local autonomy except when it conflicts with global robustness ha...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
AbstractState-of-the-art security mechanisms are often enforced in isolation from each other, which ...
A large extent of today's computer programs is distributed. For instance, services for backups, fil...
Private access to corporate servers from Internet can be achieved using various security mechanisms....
Maximizing local autonomy by delegating functionality to end nodes when possible (the end-to-end des...
The design principle of restricting local autonomy only where necessary for global robustness has le...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
The design principle of restricting local autonomy only where necessary for global robustness has le...
In a ubiquitous computing environment, devices host services that are accessed by anonymous users. T...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Nowadays, various promising paradigms of distributed computing over the Internet, such as Grids, P2P...
Virtual Private Network technology allows remote network users to benefit from resources on a privat...