Seamless object authentication in different security policy domains

Satoru Tezuka, Ryoichi Sasaki, Masanori Kataoka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In the trading of intangible goods, there co-exist, from the security policy point of view, several different domains, such as CORBA and Java. In such environment, mobile objects, such as Applet, can move freely between domains, which contributes greatly to the dynamic evolution of the distributed computer system. However, there arises a new security problem: there is no way for the mobile objects to move appropriately and seamlessly between the different security policy domains, according to the required rights. This cannot be prevented by the present security functions that are provided in such environment and each of the mobile objects. So we propose Seamless Object Authentication (SOA), which is (1) a function which clearly defines the required rights to the mobile object, and (2) a function for the domains to check the mobile objects when they move between domains. We believe that this would lead to the dynamic evolution of the distributed computer system between different security policy domains and provide the basis of a Security Centric System.

Original languageEnglish
Title of host publicationProceedings of the 33rd Annual Hawaii International Conference on System Sciences, HICSS 2000
PublisherIEEE Computer Society
ISBN (Electronic)0769504930
Publication statusPublished - 2000
Externally publishedYes
Event33rd Annual Hawaii International Conference on System Sciences, HICSS 2000 - Maui, United States
Duration: 2000 Jan 42000 Jan 7

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
Volume2000-January
ISSN (Print)1530-1605

Conference

Conference33rd Annual Hawaii International Conference on System Sciences, HICSS 2000
Country/TerritoryUnited States
CityMaui
Period00/1/400/1/7

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Seamless object authentication in different security policy domains'. Together they form a unique fingerprint.

Cite this