File Name: protection and security in distributed operating systems .zip
If a computer system has multiple users and allows the concurrent execution of multiple processes, then access to data must be regulated.
Skip to search form Skip to main content You are currently offline. Some features of the site may not work correctly. DOI: Mullender and A. Mullender , A. Tanenbaum Published Computer Science Comput. Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system administrators have no control over the user's machine?
View via Publisher. Save to Library. Create Alert. Launch Research Feed. Share This Paper. Methods Citations. Figures and Topics from this paper.
Citation Type. Has PDF. Publication Type. More Filters. Research Feed. Efficient authentication mechanisms using the iAPX Distributed systems security. QuARC: expressive security mechanisms. Functional specialization in distributed operating systems. Control for the Pepys Internet-wide File-System.
View 1 excerpt. Performance of the world's fastest distributed operating system. View 1 excerpt, cites background. Protection in a distributed document processing system. Highly Influential. View 4 excerpts, references background. View 1 excerpt, references background. An overview of the Amoeba distributed operating system. A user authentication scheme not requiring secrecy in the computer. Towards the design of secure systems. Multiuser cryptographic techniques. A high security log-in procedure.
Skip to search form Skip to main content You are currently offline. Some features of the site may not work correctly. DOI: Mullender and A. Mullender , A.
The innovations in semiconductor technology in the past decade have brought down the computing hardware cost to such a low level that the system planners of today are more inclined to have distributed systems installed wherever possible and interconnect them through communication networks. The distributed systems basically are candidates for giving increased performance, extensibility, increased availability, and resource sharing. The necessities like multiuser configuration, resource sharing, and some form of communication between the workstations have created a new set of problems with respect to privacy, security, and protection of the system as well as the user and data. This is equally true with automated office systems, which are formed by interconnecting the workstations of various departments, as the access to different sets of classified information may be restricted to different levels of management personnel. Computer privacy is concerned with the type of information collected, the person authorised to collect, the type of access and dissemination, the subject rights, the penalties, and licencing matters. Thus privacy affects all aspects of computer security.
Memory protection is a way to control memory access rights on a computer, and is a part of most modern instruction set architectures and operating systems. The main purpose of memory protection is to prevent a process from accessing memory that has not been allocated to it. This prevents a bug or malware within a process from affecting other processes, or the operating system itself.
A distributed operating system is system software over a collection of independent, networked , communicating , and physically separate computational nodes.
In computer science , hierarchical protection domains ,   often called protection rings , are mechanisms to protect data and functionality from faults by improving fault tolerance and malicious behavior by providing computer security. This approach is diametrically opposite to that of capability-based security. Computer operating systems provide different levels of access to resources. A protection ring is one of two or more hierarchical levels or layers of privilege within the architecture of a computer system. This is generally hardware-enforced by some CPU architectures that provide different CPU modes at the hardware or microcode level. Rings are arranged in a hierarchy from most privileged most trusted, usually numbered zero to least privileged least trusted, usually with the highest ring number. On most operating systems, Ring 0 is the level with the most privileges and interacts most directly with the physical hardware such as the CPU and memory.
Distributed computing systems impose new requirements on the security of the operating systems and hardware structures of the computers participating in a distributed data network environment. It is proposed that multiple level greater than two security hardware, with associated full support for that hardware at the operating system level, is required to meet the needs of this emerging environment. The security functions of individual nodes participating in a distributed computing environment, and their associated evaluation level, appear critical to the development of overall security architectures for the protection of distributed computing systems. Caelli, W. Report bugs here. Please share your general feedback.