Abstract
Abstract WebCom is a distributed computing architecture that may be used to distribute application components for execution over a network. A practical trust management system for the WebCom architecture is described. KeyNote-based authorization credentials are used to determine whether a WebCom server is authorised to schedule, and whether a WebCom client is authorised to execute, mobile application components. Secure WebCom provides a meta-language for bringing together the components of a distributed application in such a way that the components need not concern themselves with security issues.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35586-3_46
Chapter PDF
Similar content being viewed by others
References
Apache-ssl release version 1.3.6/1.36. Open source software distribution. http://www.apache.org.
M Blaze et al. The keynote trust-management system version 2. September 1999. Internet Request For Comments 2704.
M Blaze et al. The role of trust management in distributed systems security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems. Springer-Verlag Lecture Notes in Computer Science, 1999.
M. Blaze, J. Ioannidis, and A.D. Keromytis. Trust management and network layer security protocols. In Security Protocols International Workshop. Springer Verlag LNCS, 1999.
S.N Foley. A kernelized architecture for multilevel secure application policies. In European Symposium on Research in Security and Privacy. Springer Verlag LNCS 1485, 1998.
S.N. Foley and J.P Morrison. Computational paradigms and protection. In ACM New Computer Security Paradigms, Cloudcroft, NM, USA, 2001. ACM Press.
S.N. Foley, T.B. Quillinan, J.P. Morrison, D.A. Power, and J.J. Kennedy. Exploiting KeyNote in WebCom: Architecture neutral glue for trust management. In Fifth Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, Oct 2001.
L. Gong et al. Going beyond the sandbox: An overview of the new security architecture in the java development kit 1.2. In USENIX Symposium on Internet Technologys and Systems, pages 103–112, 1997.
DSTC Security group. JCSI Java Crypto and Security Implementation. See http://security.dstc.edu.au..
C.V. Lopes and K.J. Lieberherr. Abstracting process-to-process relations in concurrent object-oriented applications. In European Conference on Object-Oriented Programming (ECOOP). Springer Verlag LNCS 821, 1994.
John P. Morrison and David A.Power. Master promotion and client redirection in the webcom system. In PDPTA, Las Vegas USA, 2000.
J.P. Morrison, D.A. Power, and J.J. Kennedy. A Condensed Graphs Engine to Drive Metacomputing. Proceedings of the international conference on parallel and distributed processing techniques and applications (PDPTA ’99), Las Vagas, Nevada, June 28 — July 1, 1999.
J.P. Morrison and M. Rem. Speculative computing in the condensed graphs machine. proceedings of IWPC’99: University of Aizu, Japan, 21–24 Sept 1999.
R Rivest and B Lampson. SDSI — a simple distributed security infrastructure. In DIMACS Workshop on Trust Management in Networks 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Foley, S.N., Quillinan, T.B., Morrison, J.P. (2002). Secure Component Distribution Using WebCom. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds) Security in the Information Society. IFIP Advances in Information and Communication Technology, vol 86. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35586-3_31
Download citation
DOI: https://doi.org/10.1007/978-0-387-35586-3_31
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1026-7
Online ISBN: 978-0-387-35586-3
eBook Packages: Springer Book Archive