Abstract
A distributed resource environment (DRE) allows distributed components (i.e., servers, legacy systems, databases, COTs, printers, scanners, etc.) to be treated akin to OS resources, where each component (resource) can publish services (an API), that are then available for use by clients and resources alike. DREs have lagged in support of security. To address this deficiency, this paper concentrates on proposing a technique for seamlessly integrating a role-based security model, authorization, authentication, and enforcement into a DRE, including our prototyping with the JINI DRE.
This work partially supported by the Mitre Corporation and a AFOSR grant.
Chapter PDF
References
K. Arnold, et al., The JINI Specification, Addison-Wesley, 1999.
S. Demurjian and T.C. Ting, “Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications”, Journal of Computer Security, Vol. 5,No. 4, 1997.
A. Fox and S. Gribble, “Security on the Move: Indirect Authentication Using Kerberos”, ACM MOBICON 96, Rye, NY, 1996.
F. H. Lochovsky and C. C. Woo, “Role-Based Security in Data Base Management Systems”, in Database Security: Status and Prospects, C. Landwehr (ed.), North-Holland, 1988.
Microsoft Corporation, The Component Object Model (Technical Overview), Microsoft Press, Redmond, WA, 1995
C. Nueman and T. Ts’o, “An Authorization Service for Computer Networks”, Comm. of the ACM, Vol. 32,No. 9, Sept. 94.
Object Management Group, The Common Object Request Broker: Architecture and Specification, Rev. 2.0, MA, July 1995.
Oppliger, R. “Internet Security: Firewalls and Beyond”, Comm. of the ACM, Vol. 40No. 5, May 1997.
M. Reiter and S. Stubblebine, “Authentication Metric Analysis and Design”, ACM Trans. On Information and System Security, Vol. 2, No. 2, May 1999.
W. Rosenberry, D. Kenney, and G. Fischer, Understanding DCE, O’Reilly & Associates, 1992.
R. Sandhu, et al., “Role-Based Access Control Models”, IEEE Computer, Vol. 29,No. 2, Feb. 1996.
R. Sandhu and J. Park, “Decentralized User-Role Assignment for Web-based Intranets”, Proc. of the 3rd ACM Wksp. on Role-Based. Access Control, Fairfax, VA, Oct. 1998.
D. Spooner, “The Impact of Inheritance on Security in Object-Oriented Database Systems”, in Database Security, II: Status and. Prospects, C. Landwehr (ed.), North-Holland, 1989.
V. Swarup, “Trust Appraisal and Secure Routing of Mobile Agents”, Proc. of 1997 Workshop on Foundations for Secure Mobile Code. (DARPA), March 1997.
Walsh, T., Paciorek, N., and Wong, D. “Security and Reliability in Concordia”, Proc. of the 31st Hawaii Intl. Conf. on System Sciences. (HICSS’98), 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Kluwer Academic Publishers
About this chapter
Cite this chapter
Demurjian, S., Ting, T., Balthazar, J., Ren, H., Phillips, C., Barr, P. (2002). User Role-Based Security Model for a Distributed Environment. In: Thuraisingham, B., van de Riet, R., Dittrich, K.R., Tari, Z. (eds) Data and Application Security. IFIP International Federation for Information Processing, vol 73. Springer, Boston, MA. https://doi.org/10.1007/0-306-47008-X_23
Download citation
DOI: https://doi.org/10.1007/0-306-47008-X_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7514-2
Online ISBN: 978-0-306-47008-0
eBook Packages: Springer Book Archive