The Saga Security System: A Security Architecture for Open Distributed Systems
نویسندگان
چکیده
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The authorization model in Saga Security System (Saga authorization model) supports the novel concept of a service path and provides uniform and flexible protection appropriate for advanced computational models such as objectoriented systems and cooperative agent systems. With respect to the security mechanism of Saga Security System, its key features are an access token and a Security Monitor. Access tokens are implemented using public key technology and ensure integrity of request messages issued by Saga Agents. In addition, we can regard the Security Monitor of a Saga Agent as a reference monitor for the Agent. Security of a Saga Agent during its traversal over distributed environments is controlled by the Security Monitor integrated with the Agent.
منابع مشابه
A New Authorization Model and its Mechanism Using Service Paths in Open Distributed Environments
In open distributed systems multiple software agents or objects work in cooperation to achieve some goal Therefore we need an authorization model that can control security and trust relationships of agents Saga Security Sys tem does o er such an auhorization model as well as a security mechanism both of which are thoroughly discussed in this paper In the model the unit of authorization is a ser...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملInformation Security Approach in Open Distributed Multi-Agent Virtual Learning Environment
This paper presented the main information, security problems and threats in open multi-agent distributed e-learning information systems and Proposed various approaches to solve information security attacks in virtual learning environment using service oriented architecture which based on multi-agent information systems architecture, the solution on the multi-agent learning information system im...
متن کامل