{"id":"https://openalex.org/W2152443706","doi":"https://doi.org/10.1109/csac.2002.1176288","title":"A security architecture for object-based distributed systems","display_name":"A security architecture for object-based distributed systems","publication_year":2003,"publication_date":"2003-06-26","ids":{"openalex":"https://openalex.org/W2152443706","doi":"https://doi.org/10.1109/csac.2002.1176288","mag":"2152443706"},"language":"en","primary_location":{"id":"doi:10.1109/csac.2002.1176288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csac.2002.1176288","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/1871/12809","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014816664","display_name":"Bogdan C. Popescu","orcid":null},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"B.C. Popescu","raw_affiliation_strings":["Vrije Universiteit, Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027678871","display_name":"Maarten van Steen","orcid":"https://orcid.org/0000-0002-5113-2746"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"M. van Steen","raw_affiliation_strings":["Vrije Universiteit, Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048320589","display_name":"Andrew S. Tanenbaum","orcid":"https://orcid.org/0000-0002-9547-801X"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"A.S. Tanenbaum","raw_affiliation_strings":["Vrije Universiteit, Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I865915315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014816664"],"corresponding_institution_ids":["https://openalex.org/I865915315"],"apc_list":null,"apc_paid":null,"fwci":2.4802,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.91445157,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1787","issue":null,"first_page":"161","last_page":"171"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8461501598358154},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.8405026793479919},{"id":"https://openalex.org/keywords/distributed-system-security-architecture","display_name":"Distributed System Security Architecture","score":0.6281381249427795},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5944825410842896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5819973945617676},{"id":"https://openalex.org/keywords/distributed-object","display_name":"Distributed object","score":0.5428831577301025},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.47220879793167114},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44936904311180115},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4425885081291199},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3497968912124634},{"id":"https://openalex.org/keywords/common-object-request-broker-architecture","display_name":"Common Object Request Broker Architecture","score":0.3245779871940613},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24478447437286377},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2032160460948944},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.11615043878555298},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.08863916993141174}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8461501598358154},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.8405026793479919},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.6281381249427795},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5944825410842896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5819973945617676},{"id":"https://openalex.org/C81192388","wikidata":"https://www.wikidata.org/wiki/Q5283169","display_name":"Distributed object","level":3,"score":0.5428831577301025},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.47220879793167114},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44936904311180115},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4425885081291199},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3497968912124634},{"id":"https://openalex.org/C49312422","wikidata":"https://www.wikidata.org/wiki/Q691593","display_name":"Common Object Request Broker Architecture","level":2,"score":0.3245779871940613},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24478447437286377},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2032160460948944},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.11615043878555298},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.08863916993141174},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":11,"locations":[{"id":"doi:10.1109/csac.2002.1176288","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csac.2002.1176288","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.126.8248","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.8248","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.vu.nl/~ast/publications/acsac-2002.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.13.8683","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8683","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.vu.nl/pub/papers/globe/IR-492.02.ps.gz","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.133.4276","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.4276","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.acsac.org/2002/papers/30.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.19.170","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.vu.nl/pub/papers/globe/acsac.02.ps.Z","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.700.665","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.700.665","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.distributed-systems.net/papers/2002.acsac.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.77.2136","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.2136","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.vu.nl/pub/papers/globe/IR-492.02.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.80.5778","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.5778","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.vu.nl/pub/papers/globe/acsac.02.pdf","raw_type":"text"},{"id":"pmh:vu1:oai:dare.ubvu.vu.nl:1871/12809","is_oa":true,"landing_page_url":"http://hdl.handle.net/1871/12809","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"TITLE=None","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:vu:oai:research.vu.nl:publications/4fc17301-9887-46f1-b236-d21bfb8b8b2e","is_oa":false,"landing_page_url":"https://research.vu.nl/en/publications/4fc17301-9887-46f1-b236-d21bfb8b8b2e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 18th Annual Computer Security Applications Conference","raw_type":"info:eu-repo/semantics/conferencepaper"},{"id":"pmh:vu:oai:research.vu.nl:publications/b33f35e8-6f9b-48d9-9a4e-c19124febd19","is_oa":true,"landing_page_url":"https://research.vu.nl/en/publications/b33f35e8-6f9b-48d9-9a4e-c19124febd19","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proc. 18th Annual Computer Security Applications Conference, Las Vegas, NV, December 2002","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"pmh:vu1:oai:dare.ubvu.vu.nl:1871/12809","is_oa":true,"landing_page_url":"http://hdl.handle.net/1871/12809","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"TITLE=None","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1485366606","https://openalex.org/W1586550440","https://openalex.org/W1601376565","https://openalex.org/W1819010326","https://openalex.org/W1992711809","https://openalex.org/W2009172815","https://openalex.org/W2020873872","https://openalex.org/W2095090099","https://openalex.org/W2104112849","https://openalex.org/W2104210894","https://openalex.org/W2104223491","https://openalex.org/W2116001007","https://openalex.org/W2118744608","https://openalex.org/W2132660758","https://openalex.org/W2153730236","https://openalex.org/W2163598690","https://openalex.org/W2169667823","https://openalex.org/W2171323638","https://openalex.org/W2250734983","https://openalex.org/W2402681980","https://openalex.org/W2402789968","https://openalex.org/W2439240014","https://openalex.org/W2477350146","https://openalex.org/W2488558332","https://openalex.org/W4230060332","https://openalex.org/W4235965804","https://openalex.org/W4236944670","https://openalex.org/W4285719527","https://openalex.org/W6628998865","https://openalex.org/W6675790845","https://openalex.org/W6683798602","https://openalex.org/W6684808433","https://openalex.org/W6713079407"],"related_works":["https://openalex.org/W2353525162","https://openalex.org/W2348430094","https://openalex.org/W2370192519","https://openalex.org/W2385881301","https://openalex.org/W1522494633","https://openalex.org/W2380304044","https://openalex.org/W2057461230","https://openalex.org/W2363005332","https://openalex.org/W2372346798","https://openalex.org/W2115005006"],"abstract_inverted_index":{"Large-scale":[0],"distributed":[1,22],"systems":[2],"present":[3,8,13],"numerous":[4],"security":[5,16,134],"problems":[6],"not":[7],"in":[9,66],"local":[10],"systems.":[11],"We":[12],"a":[14,19,67],"general":[15],"architecture":[17],"for":[18,29,136],"large-scale":[20],"object-based":[21],"system.":[23],"Its":[24],"main":[25],"features":[26,63],"include":[27],"ways":[28,48],"servers":[30,40,105],"to":[31,35,41,49,85,94,96,104,106,113,119],"authenticate":[32,36],"clients,":[33],"clients":[34],"servers,":[37],"new":[38],"secure":[39,121,124],"be":[42],"instantiated":[43],"without":[44],"manual":[45],"intervention,":[46],"and":[47,69,103,123,133],"restrict":[50],"which":[51,55,58,98,108],"client":[52],"can":[53],"perform":[54],"operation":[56],"on":[57],"object.":[59],"All":[60],"of":[61],"these":[62],"are":[64,75,111,117],"done":[65],"platform-":[68],"application-independent":[70],"way,":[71],"so":[72],"the":[73,82,130],"results":[74],"quite":[76],"general.":[77],"The":[78,127],"basic":[79],"idea":[80],"behind":[81],"scheme":[83],"is":[84],"have":[86],"each":[87],"object":[88],"owner":[89],"issue":[90],"cryptographically":[91],"sealed":[92],"certificates":[93,116,132],"users":[95],"prove":[97,107],"operations":[99,109],"they":[100,110],"may":[101],"request":[102],"authorized":[112],"execute.":[114],"These":[115],"used":[118],"ensure":[120],"binding":[122],"method":[125],"invocation.":[126],"paper":[128],"discusses":[129],"required":[131],"protocols":[135],"using":[137],"them.":[138]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
