[go: up one dir, main page]

McDaniel et al., 2003 - Google Patents

Securing Distributed Applications Using a Policy-based Approach

McDaniel et al., 2003

View PDF
Document ID
9507296187979916123
Author
McDaniel P
Prakash A
Publication year
Publication venue
Ann Arbor, Dec

External Links

Snippet

Distributed applications are increasingly being used for communication, sharing data, and distributing data by users. However, incorporating security in them remains a significant challenge for both developers and users for several reasons. First, the security features …
Continue reading at patrickmcdaniel.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Park et al. Role-based access control on the web
US9619632B2 (en) System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
JP4955181B2 (en) Method and apparatus for managing secure collaborative transactions
Agarwal et al. An integrated solution for secure group communication in wide-area networks
US20030126464A1 (en) Method and system for determining and enforcing security policy in a communication session
US20040255137A1 (en) Defending the name space
US20060294366A1 (en) Method and system for establishing a secure connection based on an attribute certificate having user credentials
JP2009514046A (en) Method and system for single sign-on operation providing grid access and network access
KR20060100920A (en) Trusted Third Party Authentication for Web Services
McDaniel et al. Securing Distributed Applications Using a Policy-based Approach
Palomar et al. Secure content access and replication in pure p2p networks
McDaniel et al. Antigone: Implementing policy in secure group communication
McDaniel Policy management in secure group communication
Åslund Authentication in peer-to-peer systems
US20060031418A1 (en) Authenticating client-to-client communication
US12069050B1 (en) Reciprocal authentication of digital transmissions and method
Zhang et al. Formal Modeling and Verification of ICN-IoT Middleware Architecture (S).
McDaniel et al. Enforcing provisioning and authorization policy in the antigone system
Freudenthal et al. Switchboard: secure, monitored connections for client-server communication
Karale et al. Auditing-Based framework for securing producer-consumer systems
Caronni Dynamic security in communication systems
Cui et al. Approaching secure communications in a message-oriented mobile computing environment
Skriver et al. Using static analysis to validate SAML protocols
Singh Fault tolerant and highly available entitlement server
CN119865352A (en) System and method for cross-domain data sharing based on blockchain in industrial Internet of things