2002
DOI: 10.1007/978-0-387-35586-3_31
|View full text |Cite
|
Sign up to set email alerts
|

Secure Component Distribution Using WebCom

Abstract: WebCom is a distributed computing architecture that may be used to distribute application components for execution over a network. A practical trust management system for the WebCom architecture is described. KeyNote-based authorization credentials are used to determine whether a WebCom server is authorised to schedule, and whether a WebCom client is authorised to execute, mobile application components. Secure WebCom provides a meta-language for bringing together the components of a distributed application in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2003
2003
2006
2006

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…Previous work has examined the use of Trust Management in providing a security architecture within the WebCom metacomputing environment [8]. WebCom provides support for heterogeneous applications, potentially made up of such web service/middleware technologies as EJB, COM (.NET) and Grid middlewares, such as Globus.…”
Section: Introductionmentioning
confidence: 99%
“…Previous work has examined the use of Trust Management in providing a security architecture within the WebCom metacomputing environment [8]. WebCom provides support for heterogeneous applications, potentially made up of such web service/middleware technologies as EJB, COM (.NET) and Grid middlewares, such as Globus.…”
Section: Introductionmentioning
confidence: 99%
“…KeyNote is used to manage the authorization relationships in the Secure WebCom Metacomputer [29,30]. WebCom [31] is a client/server based system that may be used to schedule mobile application components for execution across a network.…”
Section: Grid Computingmentioning
confidence: 99%
“…The default security architecture in WebCom utilises the KeyNote trust management system to ensure only authorised clients are scheduled secured components [28], [29]. Providing support for either reputation based or monetary based metrics becomes a matter of performing additional authorisation checks.…”
Section: A Trust Management In Webcommentioning
confidence: 99%
“…Applications are coded as hierarchical graphs which provide a simple notation in which lazy, eager and imperative computation can be naturally expressed. A Secured WebCom environment [28] uses KeyNote to help manage the trust relationship with other Secured WebCom environments. A WebCom environment [33], [34], [35] (Figure 9) is made up of several modular components: Execution Engine Modules, Connection Manger Modules, Load Balancing Modules and Security Manager Modules.…”
Section: Towards Trust Management Support For Grid Administrationmentioning
confidence: 99%
See 1 more Smart Citation