Show simple item record

dc.contributor.advisorJensen, Christian
dc.contributor.authorHarrington, Anthony
dc.date.accessioned2006-06-21T10:44:35Z
dc.date.available2006-06-21T10:44:35Z
dc.date.issued2001-09
dc.date.submitted2006-06-21T10:44:35Z
dc.identifier.urihttp://hdl.handle.net/2262/918
dc.description.abstractThe rapid growth of mobile computing and the deployment of large distributed systems which span multiple administrative domains has created new challenges for security systems. Changing usage patterns and the physical limitations of mobile devices require users to rely on services provided by remote elements in the system to facilitate data access and storage requirements. Users need to minimize the trust placed in remote elements of the system such as the transmission mechanism and file server which may be beyond their control. They require secure mechanisms for accessing the sharing protected data. The access control mechanism deployed on the remote server should be flexible but capable of providing the levels of security required. Finally access control should not constitute a bottleneck in the system.en
dc.description.abstractThis thesis will investigate the feasibility of using cryptography as a form of access control in distributed systems. Cryptographic Access Control is a new paradigm in access control mechanisms which uses a combination of symmetric and asymmetric cryptography to provide user authentication, data confidentiality and integrity in distributed file systems. Its design reflects the challenges placed on systems by the changing operational environment. It is flexible enough to operate across multiple domains with varying security requirements and offers a high degree of resource protection in untrusted enviornments. It makes no assumptions about the security of remote elements in the system such as the transport mechanism or file server and only requires that the user place complete trust in his own machine. Access control is essentially determined by the possesion of cryptography keys. Possession of the public key allows a users to have read access to data and possession of the private key allows a user to have write access to data.en
dc.format.extent459968 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoenen
dc.relation.hasversionTCD-CS-2001-34.pdfen
dc.subjectComputer Scienceen
dc.titleCryptographic Access Control for a Network File Systemen
dc.typeMasters (Taught)
dc.typeMaster of Science (M.Sc.)


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record