{"title":"分布式系统中安全对象访问和无限制移动的范例","authors":"L. Lopriore","doi":"10.1080/17445760.2022.2095384","DOIUrl":null,"url":null,"abstract":"In distributed architectures consisting of processing nodes, we associate a node chain with each object. The node chain connects a node named in the object identifier to the nodes reserving secondary and primary memory space for the object. No restriction exists on object movements across the network. A process can access a given object only if it holds a security gate referencing this object. The gate includes a password and the specification of an access authorisation. Gate weakening and revocation are fully supported. GRAPHICAL ABSTRACT","PeriodicalId":45411,"journal":{"name":"International Journal of Parallel Emergent and Distributed Systems","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2022-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A paradigm for secure object access and unrestricted mobility in distributed systems\",\"authors\":\"L. Lopriore\",\"doi\":\"10.1080/17445760.2022.2095384\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In distributed architectures consisting of processing nodes, we associate a node chain with each object. The node chain connects a node named in the object identifier to the nodes reserving secondary and primary memory space for the object. No restriction exists on object movements across the network. A process can access a given object only if it holds a security gate referencing this object. The gate includes a password and the specification of an access authorisation. Gate weakening and revocation are fully supported. GRAPHICAL ABSTRACT\",\"PeriodicalId\":45411,\"journal\":{\"name\":\"International Journal of Parallel Emergent and Distributed Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2022-07-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Parallel Emergent and Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/17445760.2022.2095384\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Parallel Emergent and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/17445760.2022.2095384","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
A paradigm for secure object access and unrestricted mobility in distributed systems
In distributed architectures consisting of processing nodes, we associate a node chain with each object. The node chain connects a node named in the object identifier to the nodes reserving secondary and primary memory space for the object. No restriction exists on object movements across the network. A process can access a given object only if it holds a security gate referencing this object. The gate includes a password and the specification of an access authorisation. Gate weakening and revocation are fully supported. GRAPHICAL ABSTRACT