An intrusion-tolerant authorization and authentication scheme in distributed environments.
Yuanbo GuoJianfeng MaPublished in: ACM SIGOPS Oper. Syst. Rev. (2004)
Keyphrases
- distributed environment
- authentication scheme
- access control policies
- security analysis
- access control
- smart card
- security requirements
- distributed systems
- application server
- user authentication
- secret key
- distributed databases
- security policies
- intelligent agents
- authentication protocol
- public key
- peer to peer
- conflict resolution
- application developers
- security mechanisms
- data mining
- operating system
- open source
- digital libraries
- data streams
- information systems