Skip to main content

Security facilities in distributed systems

  • Chapter
  • 28 Accesses

Abstract

Security is an essential issue for all computer systems. The security objectives integrity, availability and confidentiality have to be strived for. This is also valid for distributed systems. Already in the development of distributed systems security has to be considered. The COMANDOS project which develops a platform for object-oriented distributed systems has developed a security architecture. It is a framework for several security facilities and comprises security services and security tools. This paper gives an overview of the security architecture and a description of the security services and security tools which have been identified.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Balter, R. (1989): Construction and Management of Distributed Office Systems — Achievements and Future Trends. In: ESPRIT′89, Proceedings of the 6th Annual ESPRIT Conference, Brussels, Commission of the European Communities (Ed.), pp. 47–58.

    Google Scholar 

  • Banatre, J.P., M. Banatre, G. Muller (1988): Main Aspects of the GOTHIC Distributed System. In: R. Speth (Ed.): Research in Networks and Distributed Applications. Proceedings of EUTECO ‘8, Vienna, North-Holland, Amsterdam, 1988, pp. 747–760.

    Google Scholar 

  • Baur, A. and W. Weiß (1990): Analysis of Audit and Protocol Data Using Methods from Artificial Intelligence (Concept and Design). Working paper Sie-0011 of ESPRIT Project 2071 ( COMANDOS), Siemens AG, February 1990.

    Google Scholar 

  • Black, A. (1985): Supporting Distributed Applications: Experience with Eden. In: 10. ACM SIGOPS, December 1985.

    Google Scholar 

  • DoD (1985): Department of Defense Trusted Computer System Evaluation Criteria. US Department of Defense Computer Security Center, DoD 5200.28-STD, Library No. S225. 711, December 1985.

    Google Scholar 

  • ECMA (1988): Security in Open Systems - A Security Framework. ECMA TR/46, July 1988.

    Google Scholar 

  • Finn, E., C. Horn and A. Kramer (1990): Security Facilities in the Oisin Kernel. Working paper TCD-0016 of ESPRIT Project 2071 ( COMANDOS), Trinity College Dublin, January 1990.

    Google Scholar 

  • ISO (1988): Information Processing Systems - OSI Reference Model - Part 2: Security Architecture. ISO/I EC JTC 1/SC 21 N 2890, July 1988.

    Google Scholar 

  • Lorin, H. (1988): Aspects of distributed computer systems. John Wiley & Sons, New York, 1988.

    Google Scholar 

  • Meitner, H., A.J. Ness, F. Reim, R. Balter, G. Vandome, R. Gagliardi, G. Mainetto and E. Finn (1989): Description of the Security Architecture as an Addendum to the Global Architecture. Deliverable T3.3.13-D1-890216 of ESPRIT Project 834 ( COMANDOS), Universität Stuttgart, FraunhoferInstitut für Arbeitswirtschaft und Organisation, Bull Research Centre, Istituto di l’Elaborazione dell’Informazione del C.N.R. and Trinity College Dublin, February 1989.

    Google Scholar 

  • Meitner, H., M. Englert und J. Müller (1989): Security Management Tools. Chapter 2 of the Report on the Design and Partial Implementation. Deliverable D2-T3.3.13-210389 of ESPRIT Project 834 ( COMANDOS), Universität Stuttgart, Fraunhofer-Institut für Arbeitswirtschaft und Organisation, March 1989.

    Google Scholar 

  • Meitner, H., F. Reim and C. Persy (1990): Implementation Specification of the Security Tools. Deliverable UoS/IAO-0031 of ESPRIT Project 2071 (COMANDOS), Universität Stuttgart and Fraunhofer-Institut für Arbeitswirtschaft und Organisation, Stuttgart, Siemens AG, München, March 1990.

    Google Scholar 

  • Ness, A., F. Reim, H. Meitner and J. Niemeier (1986): Decision Support System for Planning and Design of Distributed Office Systems, Deliverable FHG-D1-T1.1-860829 of ESPRIT Project 834 ( COMANDOS), Universität Stuttgart and Fraunhofer-Institut für Arbeitswirtschaft und Organisation, Stuttgart, 1986.

    Google Scholar 

  • Ness, A.J., F. Reim, P. Hirsch, H. Meitner, T.M. Maier, J. Hilber and G. Kerber (1987): Specification of a Decision Support System for the Design of Distributed Systems. Deliverable UoS/FhG-D1- T3.3.14-871009 of ESPRIT Project 834 ( COMANDOS), Universität Stuttgart and Fraunhofer-Institut für Arbeitswirtschaft und Organisation, Stuttgart, October 1987.

    Google Scholar 

  • Ness, A.J., M. Siegler, F. Reim and J. Baumann (1988): Description of the Prototypes of System Observation Facility and System Control Facility for a Distributed Office System. Deliverable UoS/IAO-D2-T3.3.15-880930 of ESPRIT Project 834 ( COMANDOS), Universität Stuttgart and Fraunhofer-Institut für Arbeitswirtschaft und Organisation, September 1988.

    Google Scholar 

  • Reim, F., A.J. Ness, M. Englert, G. Kerber and M. Rothenbacher (1988): DISDES Distributed Information System Designer - Partial Prototype of the DOS Design Tool. Deliverable UoS/IAO-D1-T3.3.15-880930 of ESPRIT Project 834 ( COMANDOS), Universität Stuttgart and Fraunhofer-Institut für Arbeitswirtschaft und Organisation, October 1988.

    Google Scholar 

  • Satyanarayanan, M. (1989): Integrating Security in a Large Distributed System. In: ACM Transactions on Computer Systems, Vol. 7, No. 3, August 1989, pp. 247–280.

    Article  Google Scholar 

  • Sun (1986): System Administration for the Sun Workstation. Sun Microsystems, Part No: 800-1323- 03, Mountain View, 1986, pp. 17–58.

    Google Scholar 

  • ZSI (1989): IT-Sicherheitskriterien - Kriterien für die Bewertung der Sicherheit von Systemen der Informationstechnik (IT). Zentralstelle für Sicherheit in der Informationstechnik, Bundesanzeiger Verlagsges. mgH, Köln, January 1989.

    Google Scholar 

Download references

Authors

Editor information

Heiko Lippold Paul Schmitz

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig

About this chapter

Cite this chapter

Meitner, H. (1990). Security facilities in distributed systems. In: Lippold, H., Schmitz, P. (eds) Sicherheit in netzgestützten Informationssystemen. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-83581-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-83581-9_24

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05105-1

  • Online ISBN: 978-3-322-83581-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics