Abstract
In the Internet computing environment, clients usually invoke remote components to accomplish computation, which leads to many security problems. Traditional network component architecture model focuses on business logic, and takes little consideration for security problems. This paper proposes Secure Network Component Architecture Model (SNCAM). It classifies clients according to their credibility levels on component-side. Next, it presents the main idea of this paper, which is the security domain. To reduce the overhead introduced by the security mechanism, a method called security agent is also proposed.
The work is supported in part by Natural Science Foundation of Zhejiang Province of China with grant No. Z104550, Zhejiang Provincial Science and Technology Department Key Projects with grant No. 2005C21024, of China.
Chapter PDF
Similar content being viewed by others
References
Ylönen, T., Kivinen, T., Saarinen, M., Rinne, T., Lehtinen, S.: SSH Protocol Architecture. Internet Engineering Task Force (2002) (work in progress)
Bernholdt, D.E., Elwasif, W.R., Kohl, J.A., Epperly, T.G.W.: A component architecture for high-performance computing. In: Proceedings of the Workshop on Performance Optimization via High-Level Languages (POHLL 2002), New York, NY (June 2002)
Rivest, R.L., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure. Working document from http://theory.lcs.mit.edu/cis/sdsi.html
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: Ponder: A Language for specifying Management and Security Policies for Distributed Systems, Imperial College Research Report DoC 2001 (January 2001)
Lacoste, G.: SEMPER: A Security Framework for the Global Electronic Marketplace, IIR London (1997)
Yang, L., Yi, Z., ZhaoHui, W.: Abstract Software Architecture Model based on Network Component. Journal of Zhejiang University, Engineering Science 38(11), 1402–1407 (2004)
Thomas, A.: Enterprise JavaBeans: Server Component Model for Java, White Paper (December 1997), http://www.javasoft.com/products/ejb/
Sloman, M.S., Magee, J.: An Architecture for Managing Distributed Systems. In: Proceedings of the Fourth IEEE InternationalWorkshop on Future Trends of Distributed Computing Systems, pp. 40–46. IEEE Computer Society Press, Los Alamitos (1993)
Lupu, E.C., Sloman, M.S.: Towards a Role Based Framework for Distributed Systems Management. Journal of Network and Systems Management 5(1), 5–30 (1997b)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, D., Li, Y., Zhou, Y., Wu, Z. (2006). Security and Performance in Network Component Architecture. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds) Computational Science – ICCS 2006. ICCS 2006. Lecture Notes in Computer Science, vol 3991. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11758501_171
Download citation
DOI: https://doi.org/10.1007/11758501_171
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34379-0
Online ISBN: 978-3-540-34380-6
eBook Packages: Computer ScienceComputer Science (R0)