SCOM: A Security and Privacy Layer for Horus
Cooper, David A.
A large number of distributed applications will soon be implemented for which the inclusion of some form of security will be important. While the programmers who design these applications may have expertise in the application area, they most likely will not be experts in the areas of distributed computing or security. In both of these areas, a firm knowledge of the subject is necessary in order to avoid subtle, hard to detect flaws in design. The Horus system was created to enable the design and implementation of distributed applications. The ultimate goal of this work is to allow for the implementation of efficient distributed applications while hiding many of the problems associated with the design of such applications from the applications programmer. In this paper, we describe work we have done to facilitate the implementation of secure distributed applications on top of the Horus system.
computer science; technical report
Previously Published As