Affiliation:
1. Politehnica University of Bucharest, Romania
Abstract
Security in distributed systems is a combination of confidentiality, integrity and availability of their components. It mainly targets the communication channels between users and/or processes located in different computers, the access control of users / processes to resources and services, and the management of keys, users and user groups. Distributed systems are more vulnerable to security threats due to several characteristics such as their large scale, the distributed nature of the control, and the remote nature of the access. In addition, an increasing number of distributed applications (such as Internet banking) manipulate sensitive information and have special security requirements. After discussing important security concepts in the Background section, this chapter addresses several important problems that are at the aim of current research in the security of large scale distributed systems: security models (which represent the theoretical foundation for solving security problems), access control (more specific the access control in distributed multi-organizational platforms), secure communication (with emphasis on the secure group communication, which is a hot topic in security research today), security management (especially key management for collaborative environments), secure distributed architectures (which are the blueprints for designing and building security systems), and security environments / frameworks.
Reference68 articles.
1. A survey of peer-to-peer content distribution technologies
2. Bell, D. E. (2005). Looking Back at the Bell-La Padula Model. In Proceedings of the 21st Annual Computer Security Applications Conference (pp. 337 – 351). Washington, DC: IEEE Computer Society.
3. Bernard, A. (2006). McAfee's Top Ten Security Threats for 2007. Retrieved September 2009, http://www.cioupdate.com/trends/article.php/3646826/McAfees-Top-Ten-Security-Threats-for-2007
4. Bhaiji, Y. (2008). Overview of Network Security. Network World. Retrieved February 2009, from http://www.networkworld.com/subnets/cisco/072508-ch1-net-security-technologies.html
5. Secure sessions for Web services