Exu: A System for Secure Delegation of Authority on an Insecure Network

نویسندگان

  • Karl Ramm
  • Michael Fleming Grubb
چکیده

Administration of a large and complex system poses several problems: Usually, some tasks must be delegated due to lack of qualified or trusted staff, and some tasks must be automated. In many cases, some parts of the task might need special credentials, such as Kerberos tickets or AFS tokens, that may not necessarily be easily available to the person executing the task. The problem is that most systems divide users into two groups: haves and have nots, and provide no mechanism for finer-grained access control. In addition, the tasks executed must be carefully recorded for possible later auditing. Earlier solutions, such as the setuid bit, Moira, ADM, and sysctl, can be used to accomplish this, either in a limited or dangerous (in the case of setuid) fashion. Exu proposes to solve the problem via secure, authenticated connection to a server with full authentication that can cause things to happen in real time.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The effectiveness of humor skills training in changing positive and negative affects evoked during conflict in coples with secure-insecure attatchment style

The use of humour in couple relationships is one of the constructive methods that help them to regulate their emotion. The aim of the present study was to determine the effectiveness of humour communication skills training in changing positive and negative emotions evoked during the conflict in couples with secure-insecure anxious attachment style. The present study is an experimental design wi...

متن کامل

A Calculus for Secure Channel Establishment in Open Networks

This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure channels in an insecure open network at a high level of abstraction. A channel is characterized by its direction, time of availability and its security properties. Cryptographic primitives and trust relations are interpreted as transformations for channel security ...

متن کامل

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

Social Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns

Social Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns E. Ghorbanian, M.A. T. PourEbrahim, Ph.D. P.S. Seyed Mousavi, Ph.D.   M. Habibi, Ph.D. This study was undertaken to compare social adjustment and academic achievement of female children with secure and insecure attachment patterns. The research type was descript...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995