Abstract
Attaching digital signatures to state update messages in global distributed shared object (DSO) systems is not trivial. If the DSO consists of a number of autonomous local representative that use open, public networks for maintaining the state consistency, allowing a local representative to sign state update messages is not appropriate. More sophisticated schemes are required to prevent unauthorized state updates by malicious local representative or external parties. This paper examines the problem in detail, compares a number of possible solutions, and identifies the most suitable one and demonstrates how the state update messages can be signed using the identified solution.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
D. Eastlake. Domain name system security extensions. IETF RFC2535, March 1999.
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. SPKI certifiacte theory. IETF RFC 2693, September 1999.
C. Ellison and B. Schneier. Ten risks of PKI: What you are not being told about public key infrastructure. Computer Security Journal, 16 (1): 1–7, 2000.
C. Gamage, J. Leiwo, and Y. Zheng. An efficient scheme for secure message transmission using proxy-signcryption. In Proc. 22nd Australasian Computer Science Conference, A CSC’99, Australian Computer Science Communications Vol.21, Nr.1, Springer—Verlag, 1999.
S. Kim, S. Park, and D. Won. Proxy signatures revisited. In Proc. First International Conference on Information and Communications Security, ICICS’97, LNCS 1334, Springer—Verlag, 1997.
M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures for delegating signing operation. In Proc. 3rd ACM Conference on Computer and Communications Security, 1996.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, NY, USA, 1997.
B. Neuman. Proxy-based authorization and accounting in distributed systems. In Proc. 13th International Conference on Distributed Computing Systems, 1993.
M. Van Steen, P. Homburg, and A. S.. Tanenbaum. Globe: A wide-area distributed system. IEEE Concurrency, pages 70–78, January—March 1999.
V. Varadharajan, P. Allen, and S. Black. An analysis of the proxy problem in distributed systems. In Proc. 1991 IEEE Symposium on Security and Privacy
K. Zhang. Threshold proxy signature schemes. In Proc. 1st International Information Security Workshop, ISW’97, LNCS 1396, Springer—Verlag, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Leiwo, J., Hänle, C., Homburg, P., Tanenbaum, A.S. (2000). Disallowing Unauthorized State Changes of Distributed Shared Objects. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_39
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_39
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive