Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Factors affecting distributed system security
Nessett D. IEEE Transactions on Software EngineeringSE-13 (2):233-248,1987.Type:Article
Date Reviewed: Jun 1 1988

This paper discusses the important issue of distributed system security. One might suppose that this form of security can be obtained by connecting systems meeting the DoD standard at a given level, for example, C2. However, Nessett points out that factors that were previously not considered as affecting the security of a single system must now be considered. He concentrates his attention on heterogeneous system environments: heterogeneous physical security environments, multiple jurisdictive authorities, and discrepancies in policy about mandatory and discretionary security mechanisms on the different machines. These differences can aid potential attacks, as he illustrates in detail. He provides a comprehensive bibliography that includes several of his own works that suggest possible solutions to the problem areas listed above.

Anyone who has responsibility for the security of a distributed system or for the planning of such a system should read this paper and review the pertinent references.

Reviewer:  E. A. Feustel Review #: CR123201
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Network Topology (C.2.1 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Miscellaneous (K.6.m )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy