Distributed systems, such as the Cloud, are widely used forsolving large problems, because they provide big computational powerat a low cost. From the security point of view, distributed systems posenew challenges, because the applications running on the components ofthe system could cooperate to access the system?s resources. Hence, thesecurity support should consider all the accesses performed by the appli-cations run by the same user on distinct nodes of a distributed systemas the behaviour of that user. To address this problem, this paper pro-poses mobile usage control policies that, besides regulating the usage ofthe system resources, also define the exchange of some policy fragmentsamong the nodes of the distributed system. In this way, the usage of re-sources performed on one node of the distributed system affects the rightof accessing resources on other nodes of the system. A reference scenariowhere mobile usage control policies could be successfully adopted is theCloud environment.

A Distributed Authorization System with Mobile Usage Control Policies

Mori P;Martinelli F
2011

Abstract

Distributed systems, such as the Cloud, are widely used forsolving large problems, because they provide big computational powerat a low cost. From the security point of view, distributed systems posenew challenges, because the applications running on the components ofthe system could cooperate to access the system?s resources. Hence, thesecurity support should consider all the accesses performed by the appli-cations run by the same user on distinct nodes of a distributed systemas the behaviour of that user. To address this problem, this paper pro-poses mobile usage control policies that, besides regulating the usage ofthe system resources, also define the exchange of some policy fragmentsamong the nodes of the distributed system. In this way, the usage of re-sources performed on one node of the distributed system affects the rightof accessing resources on other nodes of the system. A reference scenariowhere mobile usage control policies could be successfully adopted is theCloud environment.
2011
Istituto di informatica e telematica - IIT
usage control
Distributed systems
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/183015
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact