Abstract | ||
---|---|---|
We consider the problem of of floading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the origin servers. Our security architecture enforces the access-control policies of the origin server without replicating the access-control databases to each of the caches. We describe the security mechanisms to affect such a system and perform an extensive security analysis of our implementation. Our system is an example of how less trustworthy systems can be integrated into a distributed system architecture; it provides mechanisms to preserve the whole distributed system security even in case less trustworthy subsystems are compromised. An application of our system is the cached distribution of access-controlled contents such as subscription-based electronic libraries. |
Year | DOI | Venue |
---|---|---|
2002 | 10.1007/3-540-45853-0_8 | ESORICS |
Keywords | Field | DocType |
access-control databases,central origin server,system security,access-control policy,extensive security analysis,trustworthy system,security mechanism,system architecture,security architecture,web caches,origin server,distributed system,security,access control,security analysis,distributed applications,distributed application,authentication | Authentication,Computer security,Computer science,Distributed System Security Architecture,CPU cache,Cache,Server,Access control,Systems architecture,Enterprise information security architecture,Distributed computing | Conference |
Volume | ISSN | ISBN |
2502 | 0302-9743 | 3-540-44345-2 |
Citations | PageRank | References |
7 | 0.66 | 14 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
James Giles | 1 | 31 | 2.26 |
Reiner Sailer | 2 | 1908 | 143.12 |
Dinesh C. Verma | 3 | 176 | 42.63 |
Suresh Chari | 4 | 568 | 61.16 |