Non-discretionary access control for decentralized computing systems:
This thesis examines the issues relating to non-discretionary access controls for dencentralized computing systems. Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because message...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge, Mass.
Mass. Inst. of Technology, Lab. for Computer Science
1977
|
Schlagworte: | |
Zusammenfassung: | This thesis examines the issues relating to non-discretionary access controls for dencentralized computing systems. Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because messages must be acknowledged, operations that were read-only in a centralized system become read-write operations. As a result, the lattice model of non-discretionary access control, which mediates operations based on read versus read-write considerations does not allow direct transfer of algorithm from centralized systems. This thesis develops new mechanisms that comply with the lattice model and provide the necessary functions for effective decentralized computation. Secure protocols at several different levels are presented in the thesis. |
Beschreibung: | Zugl.: Cambridge, Mass., Univ., Diss., 1977 |
Beschreibung: | 139 S. |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021878888 | ||
003 | DE-604 | ||
005 | 20040229000000.0 | ||
007 | t | ||
008 | 880701s1977 |||| 00||| eng d | ||
035 | |a (OCoLC)227458088 | ||
035 | |a (DE-599)BVBBV021878888 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
088 | |a MIT/LCS/TR-179 | ||
100 | 1 | |a Karger, Paul A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Non-discretionary access control for decentralized computing systems |
264 | 1 | |a Cambridge, Mass. |b Mass. Inst. of Technology, Lab. for Computer Science |c 1977 | |
300 | |a 139 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Zugl.: Cambridge, Mass., Univ., Diss., 1977 | ||
520 | 3 | |a This thesis examines the issues relating to non-discretionary access controls for dencentralized computing systems. Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because messages must be acknowledged, operations that were read-only in a centralized system become read-write operations. As a result, the lattice model of non-discretionary access control, which mediates operations based on read versus read-write considerations does not allow direct transfer of algorithm from centralized systems. This thesis develops new mechanisms that comply with the lattice model and provide the necessary functions for effective decentralized computation. Secure protocols at several different levels are presented in the thesis. | |
650 | 7 | |a Access |2 dtict | |
650 | 7 | |a Computer Hardware |2 scgdst | |
650 | 7 | |a Computer Systems |2 scgdst | |
650 | 7 | |a Computer communications |2 dtict | |
650 | 7 | |a Computers |2 dtict | |
650 | 7 | |a Data processing security |2 dtict | |
650 | 7 | |a Data processing terminals |2 dtict | |
650 | 7 | |a Decentralization |2 dtict | |
650 | 7 | |a Memory devices |2 dtict | |
650 | 7 | |a Networks |2 dtict | |
650 | 7 | |a Packets |2 dtict | |
650 | 7 | |a Semantics |2 dtict | |
650 | 7 | |a Theses |2 dtict | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-015094382 |
Datensatz im Suchindex
_version_ | 1804135818837622784 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Karger, Paul A. |
author_facet | Karger, Paul A. |
author_role | aut |
author_sort | Karger, Paul A. |
author_variant | p a k pa pak |
building | Verbundindex |
bvnumber | BV021878888 |
ctrlnum | (OCoLC)227458088 (DE-599)BVBBV021878888 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02426nam a2200505zc 4500</leader><controlfield tag="001">BV021878888</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040229000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">880701s1977 |||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)227458088</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021878888</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">MIT/LCS/TR-179</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Karger, Paul A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Non-discretionary access control for decentralized computing systems</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Mass.</subfield><subfield code="b">Mass. Inst. of Technology, Lab. for Computer Science</subfield><subfield code="c">1977</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">139 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Zugl.: Cambridge, Mass., Univ., Diss., 1977</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This thesis examines the issues relating to non-discretionary access controls for dencentralized computing systems. Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because messages must be acknowledged, operations that were read-only in a centralized system become read-write operations. As a result, the lattice model of non-discretionary access control, which mediates operations based on read versus read-write considerations does not allow direct transfer of algorithm from centralized systems. This thesis develops new mechanisms that comply with the lattice model and provide the necessary functions for effective decentralized computation. Secure protocols at several different levels are presented in the thesis.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Access</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Hardware</subfield><subfield code="2">scgdst</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Systems</subfield><subfield code="2">scgdst</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer communications</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data processing security</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data processing terminals</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Decentralization</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Memory devices</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Networks</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Packets</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Semantics</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Theses</subfield><subfield code="2">dtict</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015094382</subfield></datafield></record></collection> |
id | DE-604.BV021878888 |
illustrated | Not Illustrated |
index_date | 2024-07-02T16:03:41Z |
indexdate | 2024-07-09T20:46:33Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015094382 |
oclc_num | 227458088 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 139 S. |
publishDate | 1977 |
publishDateSearch | 1977 |
publishDateSort | 1977 |
publisher | Mass. Inst. of Technology, Lab. for Computer Science |
record_format | marc |
spelling | Karger, Paul A. Verfasser aut Non-discretionary access control for decentralized computing systems Cambridge, Mass. Mass. Inst. of Technology, Lab. for Computer Science 1977 139 S. txt rdacontent n rdamedia nc rdacarrier Zugl.: Cambridge, Mass., Univ., Diss., 1977 This thesis examines the issues relating to non-discretionary access controls for dencentralized computing systems. Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because messages must be acknowledged, operations that were read-only in a centralized system become read-write operations. As a result, the lattice model of non-discretionary access control, which mediates operations based on read versus read-write considerations does not allow direct transfer of algorithm from centralized systems. This thesis develops new mechanisms that comply with the lattice model and provide the necessary functions for effective decentralized computation. Secure protocols at several different levels are presented in the thesis. Access dtict Computer Hardware scgdst Computer Systems scgdst Computer communications dtict Computers dtict Data processing security dtict Data processing terminals dtict Decentralization dtict Memory devices dtict Networks dtict Packets dtict Semantics dtict Theses dtict Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s DE-604 Zugriffskontrolle (DE-588)4293034-0 s |
spellingShingle | Karger, Paul A. Non-discretionary access control for decentralized computing systems Access dtict Computer Hardware scgdst Computer Systems scgdst Computer communications dtict Computers dtict Data processing security dtict Data processing terminals dtict Decentralization dtict Memory devices dtict Networks dtict Packets dtict Semantics dtict Theses dtict Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4070085-9 |
title | Non-discretionary access control for decentralized computing systems |
title_auth | Non-discretionary access control for decentralized computing systems |
title_exact_search | Non-discretionary access control for decentralized computing systems |
title_exact_search_txtP | Non-discretionary access control for decentralized computing systems |
title_full | Non-discretionary access control for decentralized computing systems |
title_fullStr | Non-discretionary access control for decentralized computing systems |
title_full_unstemmed | Non-discretionary access control for decentralized computing systems |
title_short | Non-discretionary access control for decentralized computing systems |
title_sort | non discretionary access control for decentralized computing systems |
topic | Access dtict Computer Hardware scgdst Computer Systems scgdst Computer communications dtict Computers dtict Data processing security dtict Data processing terminals dtict Decentralization dtict Memory devices dtict Networks dtict Packets dtict Semantics dtict Theses dtict Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Access Computer Hardware Computer Systems Computer communications Computers Data processing security Data processing terminals Decentralization Memory devices Networks Packets Semantics Theses Zugriffskontrolle Rechnernetz |
work_keys_str_mv | AT kargerpaula nondiscretionaryaccesscontrolfordecentralizedcomputingsystems |