[go: up one dir, main page]

Aqeel et al., 2006 - Google Patents

A fault-tolerant legion authentication system

Aqeel et al., 2006

Document ID
976669613136997253
Author
Aqeel M
Ansari M
Publication year
Publication venue
2006 International Conference on Emerging Technologies

External Links

Snippet

Protecting resources from unauthorized access are one of the most premier requirements of any distributed environment. Legion uses an Authentication Object that represents the user to system. AuthenticationObject is responsible for authenticating user and issuance of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Walsh et al. Security and reliability in Concordia/sup TM
EP3866041B1 (en) Secure group file sharing
US6978366B1 (en) Secure document management system
US7624283B2 (en) Protocol for trusted platform module recovery through context checkpointing
JP3640339B2 (en) System for retrieving electronic data file and method for maintaining the same
US7200869B1 (en) System and method for protecting domain data against unauthorized modification
CN102394894B (en) A method for secure management of network virtual disk files based on cloud computing
EP2102781B1 (en) Highly available cryptographic key storage (hacks)
CN105354493B (en) Trusted end-user Enhancement Method and system based on virtualization technology
US20080120302A1 (en) Resource level role based access control for storage management
TWI813771B (en) Data processing method, and apparatus, computer program and storage medium thereof
GB2301912A (en) Security for computer system resources
JP7431224B2 (en) Parameter signatures for realm security configuration parameters
CN102034052A (en) Operation system architecture based on separation of permissions and implementation method thereof
CN104735091A (en) Linux system-based user access control method and device
US20100088496A1 (en) Method and system for executing an executable file
Wobber et al. Policy-based access control for weakly consistent replication
Friedman The authorization problem in shared files
JP3756397B2 (en) ACCESS CONTROL METHOD, ACCESS CONTROL DEVICE, AND RECORDING MEDIUM
CN119691723A (en) Service authorization method and related device
Aqeel et al. A fault-tolerant legion authentication system
US8666945B1 (en) Method and apparatus for utilizing securable objects in a computer network
Low et al. Fine grained object protection in UNIX
Bacon et al. Extensible access control for a hierarchy of servers
Vijay Chaurasiya., et al