Aqeel et al., 2006 - Google Patents
A fault-tolerant legion authentication systemAqeel et al., 2006
- Document ID
- 976669613136997253
- Author
- Aqeel M
- Ansari M
- Publication year
- Publication venue
- 2006 International Conference on Emerging Technologies
External Links
Snippet
Protecting resources from unauthorized access are one of the most premier requirements of any distributed environment. Legion uses an Authentication Object that represents the user to system. AuthenticationObject is responsible for authenticating user and issuance of …
- 238000000034 method 0 description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Walsh et al. | Security and reliability in Concordia/sup TM | |
| EP3866041B1 (en) | Secure group file sharing | |
| US6978366B1 (en) | Secure document management system | |
| US7624283B2 (en) | Protocol for trusted platform module recovery through context checkpointing | |
| JP3640339B2 (en) | System for retrieving electronic data file and method for maintaining the same | |
| US7200869B1 (en) | System and method for protecting domain data against unauthorized modification | |
| CN102394894B (en) | A method for secure management of network virtual disk files based on cloud computing | |
| EP2102781B1 (en) | Highly available cryptographic key storage (hacks) | |
| CN105354493B (en) | Trusted end-user Enhancement Method and system based on virtualization technology | |
| US20080120302A1 (en) | Resource level role based access control for storage management | |
| TWI813771B (en) | Data processing method, and apparatus, computer program and storage medium thereof | |
| GB2301912A (en) | Security for computer system resources | |
| JP7431224B2 (en) | Parameter signatures for realm security configuration parameters | |
| CN102034052A (en) | Operation system architecture based on separation of permissions and implementation method thereof | |
| CN104735091A (en) | Linux system-based user access control method and device | |
| US20100088496A1 (en) | Method and system for executing an executable file | |
| Wobber et al. | Policy-based access control for weakly consistent replication | |
| Friedman | The authorization problem in shared files | |
| JP3756397B2 (en) | ACCESS CONTROL METHOD, ACCESS CONTROL DEVICE, AND RECORDING MEDIUM | |
| CN119691723A (en) | Service authorization method and related device | |
| Aqeel et al. | A fault-tolerant legion authentication system | |
| US8666945B1 (en) | Method and apparatus for utilizing securable objects in a computer network | |
| Low et al. | Fine grained object protection in UNIX | |
| Bacon et al. | Extensible access control for a hierarchy of servers | |
| Vijay | Chaurasiya., et al |