By Topic

Issues in the design of secure authorization service for distributed applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Varadharajan, V. ; Sydney Univ., NSW, Australia ; Crall, C. ; Pato, J.

As companies migrate from a centralized to a distributed computing environment, the administration and management of security policies, in particular authorization policies, is becoming an increasingly difficult task. This paper considers the issues involved in the design of a secure distributed authorization service. This paper discusses the architectural design principles, describes the authorization server architecture and components, briefly mentions some of the key authorization language constructs and outlines the steps involved in the construction of an authorization system in practice

Published in:

Global Telecommunications Conference, 1998. GLOBECOM 1998. The Bridge to Global Integration. IEEE  (Volume:2 )

Date of Conference: