Protection in distributed systems is a complex problem: which entities of a distributed system can be trusted, and according to this trust, how can the whole system be protected? The approach adopted in this thesis consists in distinguishing two levels of protection : a global protection by means of a centralized authorization server and a local protection on each site of the system by means of a security kernel. The authorization server has the responsibility of managing all access rights to persistant entites of the system while each security kernel controls all accesses to local objects (either transient or persistent) and is furthermore responsible for managing access rights for local transient objects. An authorization scheme for distr...
The subject of this thesis is to propose an in-depth protection that can be enforced by the operatin...
Our work applies autonomic computing to conventional authorization infrastructure. We illustrate tha...
Our work applies autonomic computing to conventional authorization infrastructure. We illustrate tha...
Protection in distributed systems is a complex problem: which entities of a distributed system can b...
Protection in distributed systems is a complex problem: which entities of a distributed system can b...
This work has been carried out in the framework of the Guide project, which aims at designing and im...
This work has been carried out in the framework of the Guide project, which aims at designing and im...
In many single address space operating systems, access to the distributed shared memory is often pro...
In many single address space operating systems, access to the distributed shared memory is often pro...
In many single address space operating systems, access to the distributed shared memory is often pro...
In many single address space operating systems, access to the distributed shared memory is often pro...
In this paper, we propose an authorization model for distributed databases. Multiple object granular...
This thesis deals with mandatory access control in distributed systems. We present a novel approach ...
Large-scale distributed systems present numerous security problems not present in local systems. In ...
iii Advances in telecommunications technology have resulted in the proliferation of large distribute...
The subject of this thesis is to propose an in-depth protection that can be enforced by the operatin...
Our work applies autonomic computing to conventional authorization infrastructure. We illustrate tha...
Our work applies autonomic computing to conventional authorization infrastructure. We illustrate tha...
Protection in distributed systems is a complex problem: which entities of a distributed system can b...
Protection in distributed systems is a complex problem: which entities of a distributed system can b...
This work has been carried out in the framework of the Guide project, which aims at designing and im...
This work has been carried out in the framework of the Guide project, which aims at designing and im...
In many single address space operating systems, access to the distributed shared memory is often pro...
In many single address space operating systems, access to the distributed shared memory is often pro...
In many single address space operating systems, access to the distributed shared memory is often pro...
In many single address space operating systems, access to the distributed shared memory is often pro...
In this paper, we propose an authorization model for distributed databases. Multiple object granular...
This thesis deals with mandatory access control in distributed systems. We present a novel approach ...
Large-scale distributed systems present numerous security problems not present in local systems. In ...
iii Advances in telecommunications technology have resulted in the proliferation of large distribute...
The subject of this thesis is to propose an in-depth protection that can be enforced by the operatin...
Our work applies autonomic computing to conventional authorization infrastructure. We illustrate tha...
Our work applies autonomic computing to conventional authorization infrastructure. We illustrate tha...