Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Clemson University

2012

Shibboleth

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Security And Performance Verification Of Distributed Authentication And Authorization Tools, Seok Bae Yun May 2012

Security And Performance Verification Of Distributed Authentication And Authorization Tools, Seok Bae Yun

All Theses

Parallel distributed systems are widely used for dealing with massive data sets and high performance computing. Securing parallel distributed systems is problematic. Centralized security tools are likely to cause bottlenecks and introduce a single point of failure. In this paper, we introduce existing distributed authentication and authorization tools. We evaluate the quality of the security tools by verifying their security and performance.
For security tool verification, we use process calculus and mathematical modeling languages. Casper, Communicating Sequential Process (CSP) and Failure Divergence Refinement (FDR) to test for security vulnerabilities, Petri nets and Karp Miller trees are used to find performance …