TY - GEN
T1 - Seamless object authentication in different security policy domains
AU - Tezuka, Satoru
AU - Sasaki, Ryoichi
AU - Kataoka, Masanori
N1 - Publisher Copyright:
© 2000 IEEE
PY - 2000
Y1 - 2000
N2 - In the trading of intangible goods, there co-exist, from the security policy point of view, several different domains, such as CORBA and Java. In such environment, mobile objects, such as Applet, can move freely between domains, which contributes greatly to the dynamic evolution of the distributed computer system. However, there arises a new security problem: there is no way for the mobile objects to move appropriately and seamlessly between the different security policy domains, according to the required rights. This cannot be prevented by the present security functions that are provided in such environment and each of the mobile objects. So we propose Seamless Object Authentication (SOA), which is (1) a function which clearly defines the required rights to the mobile object, and (2) a function for the domains to check the mobile objects when they move between domains. We believe that this would lead to the dynamic evolution of the distributed computer system between different security policy domains and provide the basis of a Security Centric System.
AB - In the trading of intangible goods, there co-exist, from the security policy point of view, several different domains, such as CORBA and Java. In such environment, mobile objects, such as Applet, can move freely between domains, which contributes greatly to the dynamic evolution of the distributed computer system. However, there arises a new security problem: there is no way for the mobile objects to move appropriately and seamlessly between the different security policy domains, according to the required rights. This cannot be prevented by the present security functions that are provided in such environment and each of the mobile objects. So we propose Seamless Object Authentication (SOA), which is (1) a function which clearly defines the required rights to the mobile object, and (2) a function for the domains to check the mobile objects when they move between domains. We believe that this would lead to the dynamic evolution of the distributed computer system between different security policy domains and provide the basis of a Security Centric System.
UR - http://www.scopus.com/inward/record.url?scp=85094106035&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85094106035&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85094106035
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
BT - Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, HICSS 2000
PB - IEEE Computer Society
T2 - 33rd Annual Hawaii International Conference on System Sciences, HICSS 2000
Y2 - 4 January 2000 through 7 January 2000
ER -