Exu: A System for Secure Delegation of Authority on an Insecure Network
نویسندگان
چکیده
Administration of a large and complex system poses several problems: Usually, some tasks must be delegated due to lack of qualified or trusted staff, and some tasks must be automated. In many cases, some parts of the task might need special credentials, such as Kerberos tickets or AFS tokens, that may not necessarily be easily available to the person executing the task. The problem is that most systems divide users into two groups: haves and have nots, and provide no mechanism for finer-grained access control. In addition, the tasks executed must be carefully recorded for possible later auditing. Earlier solutions, such as the setuid bit, Moira, ADM, and sysctl, can be used to accomplish this, either in a limited or dangerous (in the case of setuid) fashion. Exu proposes to solve the problem via secure, authenticated connection to a server with full authentication that can cause things to happen in real time.
منابع مشابه
The effectiveness of humor skills training in changing positive and negative affects evoked during conflict in coples with secure-insecure attatchment style
The use of humour in couple relationships is one of the constructive methods that help them to regulate their emotion. The aim of the present study was to determine the effectiveness of humour communication skills training in changing positive and negative emotions evoked during the conflict in couples with secure-insecure anxious attachment style. The present study is an experimental design wi...
متن کاملA Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure channels in an insecure open network at a high level of abstraction. A channel is characterized by its direction, time of availability and its security properties. Cryptographic primitives and trust relations are interpreted as transformations for channel security ...
متن کاململزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملSocial Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns
Social Adjustment and Academic Achievement of Female Children with Secure and Insecure Attachment Patterns E. Ghorbanian, M.A. T. PourEbrahim, Ph.D. P.S. Seyed Mousavi, Ph.D. M. Habibi, Ph.D. This study was undertaken to compare social adjustment and academic achievement of female children with secure and insecure attachment patterns. The research type was descript...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل