By Topic

Enhanced security for monitoring services in large scale distributed systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Pop, F. ; Fac. of Autom. & Comput. Sci., Univ. Politeh. of Bucharest, Bucharest, Romania ; Arcalianu, A. ; Dobre, C. ; Cristea, V.

Today computing systems employ high interaction between people and services. It is more than obvious that todays society depends every day more on such computing systems. Furthermore we cannot deny that consequences of their failures can have high cost, from financial resources loss to even human lives loss. Modern large scale distributed systems services must provide guarantees for protecting services against malicious threats. So security is becoming more important, as services can become victims of malicious attacks that can result in code injection that can affect critical components on a large scale. Because of such catastrophic consequences it has become mandatory for developers to provide security guarantees for users, usually in the form of protection mechanisms that can protect the system against the malicious behavior of services. In this paper we propose one such solution to provide security mechanisms and guarantees against security threats in large scale distributed environment. Such mechanisms consider the needs of modern distributed service-oriented applications. We propose security policies designed to handle security guarantees imposed by such applications. In the end, we present experimental results that reflect the capacity of the proposed security mechanisms and policies to correctly handle a wide range of security threats.

Published in:

Intelligent Computer Communication and Processing (ICCP), 2011 IEEE International Conference on

Date of Conference:

25-27 Aug. 2011