Security in Distributed Systems

Published on July 2016 | Categories: Documents | Downloads: 66 | Comments: 0 | Views: 314
of 3
Download PDF   Embed   Report

Comments

Content

SECURITY IN DISTRIBUTED SYSTEMS

Abstract
I argue that objects that interact in a distributed system need to be dealt with in ways that are intrinsically different from objects that interact in a single address space. These differences are required because distributed systems require that the programmer be aware of latency, have a different model of memory access, and take into account issues of concurrency and partial failure. Distributed computing became a field of intense study as the result of computer hardware miniaturization and advances in networking technologies. Distributed computing aims to unify multiple networked machines to let them share information or other resources, and encompasses multimedia systems, client-server systems, parallel computing, Web programming, mobile agents, and so on. I look at a number of distributed systems that have attempted to paper over the distinction between local and remote objects, and show that such systems fail to support basic requirements of robustness and reliability. These failures have been masked in the past by the small size of the distributed systems that have been built. In the enterprise-wide distributed systems foreseen in the near future, however, such a masking will be impossible. I conclude by discussing what is following topics required of both systems-level and applicationlevel programmers and the.

Content

• • • ? ? ? ?

What are distributed computer systems? How it works? Overview of security techniques Evolution of security needs Security model Threats and forms of attack Security notations

• Cryptographic algorithms ? Symmetric encryption algorithms ? Asymmetric encryption algorithms • Digital Signatures ? Secure digest functions ? Digital signatures with public keys Macs -Low cost signatures with shared secret • ? ? ?


Case Studies Needham-Schroeder protocol Kerberos protocol Secure socket layer protocol
Conclusion

B.Suryateja

05A21A0517

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close