Corpus ID: 167989431

An Efficient Model for Data Security Management in Distributed Systems

@inproceedings{Aski2015AnEM,
  title={An Efficient Model for Data Security Management in Distributed Systems},
  author={Ali Shafigh Aski},
  year={2015}
}
the present study discusses data security management in service provider/client systems and distributed systems and the critical situation of secure access. In this paper, data security management in distributed systems has been suggested in the form of explaining security systems, examining their weaknesses and providing appropriate solutions. The following is a summary of concepts such as authorization, documentation, encryption and access control which are the main topics in data security of… Expand

Figures from this paper

References

SHOWING 1-10 OF 33 REFERENCES
Distributed Systems Security: Issues, Processes and Solutions
TLDR
The authors provide a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of todays distributed systems using a four-tier logical model host layer, infrastructure layer, application layer, and service layer. Expand
Clusters and security: distributed security for distributed systems
TLDR
The goal of this paper is to identify various necessarily-distributed security services and their related characteristics as a means of enhancing cluster security. Expand
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems
TLDR
DROPS methodology, divide a file into fragments, and replicate the fragmented data over the cloud nodes that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker. Expand
Security engineering - a guide to building dependable distributed systems (2. ed.)
TLDR
In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. Expand
A Pattern Language for Providing Client-Server Confidential Communication
This paper extracts and documents patterns that identify problems and solutions concerning confidentiality in a client-server environment. These patterns are then organized as a pattern language. TheExpand
Towards a framework of authentication and authorization patterns for ensuring availability in service composition
TLDR
This paper presents a set of authentication and authorization patterns addressing the aspect of ensuring access to authorized users only in service composition and provides a framework and classification of these patterns, and demonstrates how the patterns can be composed with services using a policy-driven approach. Expand
Access Control Systems: Security, Identity Management and Trust Models
This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind accessExpand
Authentication for distributed systems
TLDR
The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained and an authentication framework is provided. Expand
Distributed systems: Principles and Paradigms
TLDR
Intended for use in a senior/graduate level distributed systems course or by professionals, this text systematically shows how distributed systems are designed and implemented in real systems. Expand
Authentification for Distributed Systems
TLDR
The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained and an authentication framework is provided. Expand
...
1
2
3
4
...