IEEE海量存储系统参考模型中的安全性

A. Hanushevsky
{"title":"IEEE海量存储系统参考模型中的安全性","authors":"A. Hanushevsky","doi":"10.1109/MASS.1993.289775","DOIUrl":null,"url":null,"abstract":"The author discusses the origins of the distribution topology of the IEEE Mass Storage System Reference Model, how it affects security, and the methods that can be used to provide secure resource access. He also shows how certain security considerations emphasize the importance of particular Model-defined services and impose architectural constraints on those services. It is noted that the model's security problems stem from the client-centric distribution of various Model functions. These problems are heightened in Version 5 of the Model, in which any Model component is allowed to be distributed in a client-centric manner. While a distributed security scheme can provide an appropriate security environment, the relationships between Model components must be fully defined before any particular scheme can be recommended. Furthermore, it is critical that the correct authorization agents be identified with security, usability, and performance in mind. It is clear that, in certain cases, the Name Server becomes an important, if not focal, authorization agent. The challenge is to define a security protocol appropriate to the Model, as opposed to modifying the Model to fit current security schemes.<<ETX>>","PeriodicalId":225568,"journal":{"name":"[1993] Proceedings Twelfth IEEE Symposium on Mass Storage systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security in the IEEE Mass Storage System Reference Model\",\"authors\":\"A. Hanushevsky\",\"doi\":\"10.1109/MASS.1993.289775\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The author discusses the origins of the distribution topology of the IEEE Mass Storage System Reference Model, how it affects security, and the methods that can be used to provide secure resource access. He also shows how certain security considerations emphasize the importance of particular Model-defined services and impose architectural constraints on those services. It is noted that the model's security problems stem from the client-centric distribution of various Model functions. These problems are heightened in Version 5 of the Model, in which any Model component is allowed to be distributed in a client-centric manner. While a distributed security scheme can provide an appropriate security environment, the relationships between Model components must be fully defined before any particular scheme can be recommended. Furthermore, it is critical that the correct authorization agents be identified with security, usability, and performance in mind. It is clear that, in certain cases, the Name Server becomes an important, if not focal, authorization agent. The challenge is to define a security protocol appropriate to the Model, as opposed to modifying the Model to fit current security schemes.<<ETX>>\",\"PeriodicalId\":225568,\"journal\":{\"name\":\"[1993] Proceedings Twelfth IEEE Symposium on Mass Storage systems\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1993-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1993] Proceedings Twelfth IEEE Symposium on Mass Storage systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MASS.1993.289775\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1993] Proceedings Twelfth IEEE Symposium on Mass Storage systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MASS.1993.289775","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

作者讨论了IEEE海量存储系统参考模型的分布拓扑的起源,它如何影响安全性,以及可用于提供安全资源访问的方法。他还展示了某些安全考虑如何强调特定模型定义的服务的重要性,以及如何对这些服务施加体系结构约束。值得注意的是,模型的安全性问题源于各种模型功能的以客户端为中心的分布。这些问题在模型的版本5中得到了加强,在该版本中,任何模型组件都允许以以客户端为中心的方式进行分发。虽然分布式安全方案可以提供适当的安全环境,但是在推荐任何特定方案之前,必须完全定义Model组件之间的关系。此外,在确定正确的授权代理时要考虑安全性、可用性和性能,这一点至关重要。很明显,在某些情况下,Name Server成为一个重要的(如果不是焦点的话)授权代理。挑战在于定义适合于模型的安全协议,而不是修改模型以适应当前的安全方案
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Security in the IEEE Mass Storage System Reference Model
The author discusses the origins of the distribution topology of the IEEE Mass Storage System Reference Model, how it affects security, and the methods that can be used to provide secure resource access. He also shows how certain security considerations emphasize the importance of particular Model-defined services and impose architectural constraints on those services. It is noted that the model's security problems stem from the client-centric distribution of various Model functions. These problems are heightened in Version 5 of the Model, in which any Model component is allowed to be distributed in a client-centric manner. While a distributed security scheme can provide an appropriate security environment, the relationships between Model components must be fully defined before any particular scheme can be recommended. Furthermore, it is critical that the correct authorization agents be identified with security, usability, and performance in mind. It is clear that, in certain cases, the Name Server becomes an important, if not focal, authorization agent. The challenge is to define a security protocol appropriate to the Model, as opposed to modifying the Model to fit current security schemes.<>
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信