分布式操作系统安全威胁调查

Khan Sumra, Muhammad Waqas Syed, Ahmed Arbaz
{"title":"分布式操作系统安全威胁调查","authors":"Khan Sumra, Muhammad Waqas Syed, Ahmed Arbaz","doi":"10.26634/jcom.8.3.18262","DOIUrl":null,"url":null,"abstract":"— Over the last years, the security into software systems especially in the distributed system becomes complex day by day. The secure and trusted environment is a considerably important subject to address. Different services and resources in the distributed system have to be secure at different levels, for this reason, we have analysed in detail the flaws of the distributed systems, all the security threats, situations where the system at risk faces, and the best possible solutions to secure the distributed system. Globus security mechanism is discussed in detail well as how the authentication can be done and how do we achieve message confidentiality and integrity. Every idea that radiates all sorts of solutions to this matter is verified and well-studied. It provides the proper knowledge to help one understand the meaning of a secure system, the security policies, and the security mechanism.","PeriodicalId":130578,"journal":{"name":"i-manager's Journal on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A SURVEY OF SECURITY THREATS IN DISTRIBUTED OPERATING\\nSYSTEM\",\"authors\":\"Khan Sumra, Muhammad Waqas Syed, Ahmed Arbaz\",\"doi\":\"10.26634/jcom.8.3.18262\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"— Over the last years, the security into software systems especially in the distributed system becomes complex day by day. The secure and trusted environment is a considerably important subject to address. Different services and resources in the distributed system have to be secure at different levels, for this reason, we have analysed in detail the flaws of the distributed systems, all the security threats, situations where the system at risk faces, and the best possible solutions to secure the distributed system. Globus security mechanism is discussed in detail well as how the authentication can be done and how do we achieve message confidentiality and integrity. Every idea that radiates all sorts of solutions to this matter is verified and well-studied. It provides the proper knowledge to help one understand the meaning of a secure system, the security policies, and the security mechanism.\",\"PeriodicalId\":130578,\"journal\":{\"name\":\"i-manager's Journal on Computer Science\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"i-manager's Journal on Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.26634/jcom.8.3.18262\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"i-manager's Journal on Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26634/jcom.8.3.18262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在过去的几年里,软件系统尤其是分布式系统的安全问题日益复杂。安全和可信的环境是一个需要解决的相当重要的问题。分布式系统中不同的服务和资源需要在不同的层次上保证安全,因此,我们详细分析了分布式系统的缺陷、所有的安全威胁、系统面临风险的情况,以及保证分布式系统安全的最佳解决方案。详细讨论了Globus安全机制,以及如何进行身份验证以及如何实现消息机密性和完整性。对这个问题产生各种解决办法的每一个想法都是经过验证和充分研究的。它提供了适当的知识来帮助理解安全系统、安全策略和安全机制的含义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A SURVEY OF SECURITY THREATS IN DISTRIBUTED OPERATING SYSTEM
— Over the last years, the security into software systems especially in the distributed system becomes complex day by day. The secure and trusted environment is a considerably important subject to address. Different services and resources in the distributed system have to be secure at different levels, for this reason, we have analysed in detail the flaws of the distributed systems, all the security threats, situations where the system at risk faces, and the best possible solutions to secure the distributed system. Globus security mechanism is discussed in detail well as how the authentication can be done and how do we achieve message confidentiality and integrity. Every idea that radiates all sorts of solutions to this matter is verified and well-studied. It provides the proper knowledge to help one understand the meaning of a secure system, the security policies, and the security mechanism.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
TWITTER SENTIMENT ANALYSIS SUPPORT VECTOR MACHINE AND RANDOM FOREST MACHINE LEARNING ALGORITHMS FOR SENTIMENT ANALYSIS ON TOURISM REVIEWS: A PERFORMANCE ANALYSIS NOVEL TECHNIQUE FOR SECURE KEYLESS CAR AUTHENTICATION USING BLOCK-CHAIN FRAMEWORK Internet of things in low-power wide area network and short range network: A review EXTRACTING OF FREQUENT WEB PAGE PATTERNS USING FPPM ALGORITHM
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1