Abstract
The innovations in semiconductor technology in the past decade have brought down the computing hardware cost to such a low level that the system planners of today are more inclined to have distributed systems installed wherever possible and interconnect them through communication networks. The distributed systems basically are candidates for giving increased performance, extensibility, increased availability, and resource sharing. The necessities like multiuser configuration, resource sharing, and some form of communication between the workstations have created a new set of problems with respect to privacy, security, and protection of the system as well as the user and data. This is equally true with automated office systems, which are formed by interconnecting the workstations of various departments, as the access to different sets of classified information may be restricted to different levels of management personnel. Computer privacy is concerned with the type of information collected, the person authorised to collect, the type of access and dissemination, the subject rights, the penalties, and licencing matters. Thus privacy affects all aspects of computer security. The first level of implementation of these privacy issues, the external protection environment, consists of administrative control and physical security. The next level, the internal protection mechanisms, consists of authentication, access control, surveillance, and communications security. Implementation of the internal protection are done at three levels. The first, at the hardware level, is accomplished by means of memory protection, multiple execution states, and/or special front end processors. The second level is implemented through software by means of surveillance mechanism comprising logging, access control, information flow control, and/or threat monitoring or by isolation. The last level is the data security both in database and data transmission. Cryptographic techniques are used for data security. This paper surveys the advances made in different areas of the internal level implementation of the security policies in a computing system with special reference to a distributed computing system with internode communication. Current research is to choose the appropriate internal protection mechanism for a fault tolerant distributed computer system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Abramson, D., Hardware for Capability Based Addressing Proc. 9 th Australian Computer Conference, Hobart, (1982), 101–115.
Bell, D.E. and La Padula. L. J., Secure Computer Systems: Mathematical Foundations and Models M74–244, The Mitre Corp., Bedford, Mass (1973)
Buckingham, B.R.S., CL/SWARD Command Language SRI-CSL-79–013c, IBM Systems Research Institute, New York (1980).
Campbell, C.M., Design and Specification of Cryptographic Capabilities Proc. Conf. on Computer Security and the Data Encryption Standard, National Bureau of Standards, Gaithersburg, MD., (1977).
Cosserat, D.C., A Data Model Based on the Capability Protection Mechanism Proc. International Workshop on Protection in Operating Systems, Rocquen-court, France, (1974), 35–54.
Davida, G.I., Wells, D.L., and Kam, J.B., A Database Encryption System With Sub-keys ACM Transactions on Database Systems, 2 (1981), 312–328.
Denning, D.E., Secure Information Flow in Computer Systems Ph.D. Thesis, Purdue University, W.Lafayette, Indiana, (1975).
Denning, D.E., A Lattice Model for Secure Information Flow Comm. ACM, 19 (1976) 236–243.
Denning, D.E., Cryptography and Data Security Addison-Wesley Publishing Company, Reading, Mass., (1982).
Denning, P.J., Fault Tolerant Operating Systems ACM Computing Surveys 8 (December 1976).
Dennis, J.B., and Von Horn, E.C., Programming Semantics for Multiprogrammed Computations Comm. ACM, 9 (March 1966), 143–155.
Donnelley, J.E., and Fletcher, J.G., Resource Access Control in a Network Operating System Proc. ACM Pacific 80 Conference, San Francisco., California, (Nov. 1980)
England, D.M., Capability Concept Mechanism and Structure in System 250 Proc. International Workshop on Protection in Operating Systems, Rocquen-court, France, (August 1974).
Fabry, R.S., Capability Based Addressing Comm. ACM, 17 (July 1974), 403–412.
Fenton, J.S., Information Protection Systems Ph.D. Thesis, Univ. of Cambridge, Cambridge, England (1973).
Gat, I., and Saal, H.J., Memoryless Execution: A Programmer’s Viewpoint IBM Tech. Report 025, IBM Israeli Science Center, Haifa, Israel (March 1975).
Gligor, V.D., Review and Revocation of Access Privileges Distributed Through Capabilities IEEE Trans, on Software Engineering SE-5 (November 1979).
Graham, G.S., and Denning, P.J., Protection-Principles and practice Proc. Spring Jt. Computer conf. Vol. 40, AFIPS Press, Montvale, N.J. (1972)
Harrison, M.A., and Ruzzo, W.L., Monotonic Protection Systems in Foundations of Secure Computation, ed. R.A. DeMillo et al., Academic Press, New York (1978).
Hsiao, D.K., Kerr, D.S., and Madnick, S.E., Computer Security Academic Press, New york (1979).
Jones, A.K., Protection Mechanisms and the Enforcement of Security Policies in Operating Systems — An Advanced Course, Lecture Notes in Computer Science Vol. 60, Springer-Verlag (1978).
Keedy, J.L., A Memory Architecture for Object-Oriented Systems Proc. Objec-torientierte Software- und Hardware- architekturen, H. Stoyan, und H. Wedekind (ed.), Geran Chapter of the ACM (May 1983), 238–250.
Kent, S., Encryption Based Protection for Interactive User/Computer Communication Proc. 5 th Data Commun. Symp., Snowbird, UT, (Sept. 1977), 5–13.
Lampson, B.W., Protection Proc. 5 th Princeton Symp. of Info. Sci. and Syst., Princeton Univ. (March 1971).
Lampson, B.W., A Note on Error Confinement Comm. ACM 16 (Oct. 1973)
Lampson, B.W., Horning, J.J., London, R.L., Mitchel, J.G., and Popek, G.J., Report on the Programming Language EUCLID (Aug 1976).
Lampson, B. W., and Sturgis, H. E., Reflections on an Operating System Design Comm. ACM, 19 (May 1976), 251–265.
Lampson, B.W., Paul, M., and Siegert, H.J., (Editors), Distributed Systems- Architecture and Implementation — An Advanced Course, Lecture Notes in Computer Science, Vol. 105, Springer-Verlag (1981).
Myers, G.J., Advances in Computer Architecture John Wiley and Sons (1982).
Needham, R.M., Protection in Computing Systems Reliability, ed. T. Anderson, and B. Randell Cambridge University Press, Cambridge (1979).
Nessett, D. M., A Systematic Methodology for Analyzing Security Threats to Interprocess Communication in a Distributed System IEEE Trans. Communication Vol. COM-31, No.9, (Sept. 1983).
Neumann, P.G., Boyer, R.S., Feiertag, R.S., Levitt, K.N., and Robinson, L., A Prov-ably Secure Operating System:The System, Its Applications, and Proofs Computer Science Lab. Report CSL-116, SRI International, Menlo Park, Calif. (May 1980)
Rushby, J., and Randell, B., A Distributed Secure System Computer (July 1983), 55–67.
Saltzer, J.H., and Schroeder, M.D., The Protection of Information in Computer Systems Proc. IEEE 63 (Sept. 1975), 1278–1308.
Schroeder, M.D., and Saltzer, J.H., A Hardware Architecture for Implementing Protection Rings Comm. ACM 15 (March 1972), 157–170.
Smith, S.A., and Benjamin, R.I., Projecting Demand for Electronic Communications in Automated Offices ACM Trans Office Information Systems 1 (July 1983), 211–229.
Wilkes, M.V., and Needham, R.M., The Cambridge CAP Computer and its Operating System North Holland (1979)
Wulf, W.A., Cohen, E., Corwin, W., Jones, A.K., Levin, R., Pierson, C., and Pollack, F., HYDRA: The Kernel of a Multiprocessing System Comm. ACM 17 (June 1974), 337–345.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pedar, A. (1985). Privacy, Security, and Protection in Distributed Computing Systems. In: Krückeberg, F., Schindler, S., Spaniol, O. (eds) Offene Multifunktionale Büroarbeitsplätze und Bildschirmtext. Informatik-Fachberichte, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-09043-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-662-09043-5_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-15186-9
Online ISBN: 978-3-662-09043-5
eBook Packages: Springer Book Archive