Maly et al., 1996 - Google Patents
A privilege management system for a secure networkMaly et al., 1996
- Document ID
- 10531055340376782696
- Author
- Maly K
- Gupta A
- Kvande B
- Levinstein I
- Mukkamala R
- Olson M
- Whitney R
- Chambers R
- Publication year
- Publication venue
- Proceedings of Third International Workshop on Services in Distributed and Networked Environments
External Links
Snippet
Modern research projects may involve dozens of geographically distributed collaborators who access distributed information, applications workstations and devices. We are developing an architecture and methods for distributed, decentralized privilege …
- 230000004048 modification 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/505—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thompson et al. | Certificate-based access control for widely distributed resources | |
US6144959A (en) | System and method for managing user accounts in a communication network | |
US8463819B2 (en) | Centralized enterprise security policy framework | |
US7827598B2 (en) | Grouped access control list actions | |
US7676672B2 (en) | Administrative security systems and methods | |
US20050060572A1 (en) | System and method for managing access entitlements in a computing network | |
Jaeger et al. | Flexible control of downloaded executable content | |
Maly et al. | A privilege management system for a secure network | |
Gamble | Implementing Execution Controls in Unix. | |
Mirtchovski et al. | Plan 9-an integrated approach to grid computing | |
Maly et al. | A privilege management and enforcement system for distributed resource sharing | |
Hernández et al. | WebDAV: what it is, what it does, why you need it | |
White et al. | Problems with DCE security services | |
Ferle | Account Access and Security | |
Kirschner et al. | WALDEN: a scalable solution for grid account management | |
Juneau et al. | Jakarta Security | |
Mustafa et al. | Network Access and Evaluation | |
Thain et al. | The consequences of decentralized security in a cooperative storage system | |
Bacon et al. | Access control for a modular, extensible storage service | |
Ashley et al. | An implementation of a secure version of NFS including rbac | |
Encheva et al. | Collaborative role management for sharing protected web resources | |
Benedyczak et al. | Unicore virtual organizations system | |
Maly et al. | PMES: Privilege management and enforcement system for secure distributed resource sharing | |
Hu et al. | A scheme for authentication and authorization in a grid application | |
Authentication | Windows Authentication |