Access the full text.
Sign up today, get DeepDyve free for 14 days.
Oliver Theel (1993)
A General Framework for Modelling Data Replication Schemes
K. Beznosov, Yi Deng (2000)
Engineering access control for distributed enterprise applications
M. Naor, A. Wool (1998)
Access Control and Signatures via Quorum Secret SharingIEEE Trans. Parallel Distributed Syst., 9
S. Cheung, M. Ammar, M. Ahamad (1990)
The grid protocol: a high performance scheme for maintaining replicated data[1990] Proceedings. Sixth International Conference on Data Engineering
D. Agrawal, A. Abbadi (1991)
An efficient and fault-tolerant solution for distributed mutual exclusionACM Trans. Comput. Syst., 9
T. Yan, H. Garcia-Molina (1994)
Distributed selective dissemination of informationProceedings of 3rd International Conference on Parallel and Distributed Information Systems
Guo Yuan-bo (2008)
Threshold Byzantine Quorum System and Distributed Storage
Sun Jian (2004)
Survey of Fault Tolerant Technology Based on Quorum SystemsJournal of Computer Research and Development
(2010)
A study of quorum system-based framework for distributed Access Control [J
M. Naor, Udi Wieder (2003)
Scalable and dynamic quorum systemsDistributed Computing, 17
Joon Park, R. Sandhu, Gail-Joon Ahn (2001)
Role-based access control on the webACM Trans. Inf. Syst. Secur., 4
M. Naor, A. Wool (1994)
The load, capacity and availability of quorum systemsProceedings 35th Annual Symposium on Foundations of Computer Science
Thomas Woo, S. Lam (1998)
Designing a distributed authorization serviceProceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98, 2
S. Friedberg, G. Peterson (1987)
An Efficient Solution to the Mutual Exclusion Problem Using Weak SemaphoresInf. Process. Lett., 25
Quorum system is a preferable model to construct distributed access control architecture, but not all quorum system can satisfy the requirements of distributed access control architecture. Aiming at the dependable problem of authorization server in distributed system and combining the requirements of access control, a set of criterions to select and evaluate quorum system is presented. The scheme and algorithm of constructing an authorization server system based on Paths quorum system are designed, and the integrated system performance under some servers attacked is fully analyzed. Role-based access control on the Web implemented by this scheme is introduced. Analysis shows that with certain node failure probability, the scheme not only has high dependability but also can satisfy the special requirements of distributed access control such as real-time, parallelism, and consistency of security policy.
Wuhan University Journal of Natural Sciences – Springer Journals
Published: Jun 1, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.