首页> 外文期刊>Journal of Parallel and Distributed Computing >Protected pointers to specify access privileges in distributed systems
【24h】

Protected pointers to specify access privileges in distributed systems

机译:受保护的指针指定分布式系统中的访问权限

获取原文
获取原文并翻译 | 示例

摘要

With reference to a distributed environment consisting of nodes connected in an arbitrary network topology, we propose the organization of a protection system in which a set of subjects, e.g. processes, generates access attempts to memory segments. One or more primary passwords are associated with each node. An access to a given segment can be successfully accomplished only if the subject attempting the access holds an access privilege, certified by possession of a valid protected pointer (p-pointer) referencing that segment. Each p-pointer includes a local password; the p-pointer is valid if the local password descends from a primary password by application of a universally known, parametric one-way generation function. A set of protection primitives makes it possible to manage the primary passwords, to reduce p-pointers to include less access rights, to allocate new segments, to delete existing segments, to read the segment contents and to overwrite these contents. The resulting protection environment is evaluated from a number of viewpoints, which include p-pointer forging and revocation, the network traffic generated by the execution of the protection primitives, the memory requirements for p-pointer storage, security, and the relation of our work to previous work. An indication of the flexibility of the p-pointer concept is given by applying p-pointers to the solution of a variety of protection problems. (C) 2018 The Author(s). Published by Elsevier Inc.
机译:参考由在任意网络拓扑中连接的节点组成的分布式环境,我们提出了一组受试者的保护系统,例如:进程,生成访问尝试对存储段的尝试。一个或多个主密码与每个节点相关联。只有在尝试访问访问权限的主题保存访问权限,可以通过获取参考该段的有效受保护指针(p-pointer)认证的拍摄权限,只能成功完成对给定段的访问。每个p-pointer都包含本地密码;如果本地密码通过应用普遍已知的参数单向生成函数,本地密码可有效。一组保护基元使得可以管理主密码,以减少p-points以包括较少的访问权限,分配新段以删除现有段,以读取分段内容并覆盖这些内容。由此产生的保护环境是从多个观点评估的,它包括P-Point伪造和撤销,由执行保护基元生成的网络流量,对P指针存储,安全性和工作关系的内存要求到以前的工作。通过将P指针应用于各种保护问题的解决方案来给出p引脚概念的灵活性的指示。 (c)2018年作者。 elsevier公司出版

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号