Introduction to SECURITY By, Harsha Thota Advisor: Dr. Zhang.

Slides:



Advertisements
Similar presentations
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Sri Lanka Institute of Information Technology
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Session 4 Asymmetric ciphers.
Distributed Systems CS Security – Part I Lecture 21, Nov 28, 2011 Majd F. Sakr, Vinay Kolar, Mohammad Hammoud.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
8.1 Learning Objectives To become familiar with the range of security threats faced by networked and distributed systems (DSs); To examine various cryptographic.
Cryptographic Technologies
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Lecture 23 Symmetric Encryption
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 10: Authentication Guide to Computer Network Security.
Dr. Khalid A. Kaabneh Amman Arab University
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Cryptography, Authentication and Digital Signatures
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Cryptographic Hash Functions and Protocol Analysis
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Chapter 11 Message Authentication and Hash Functions.
Lecture 23 Symmetric Encryption
Information Security in Distributed Systems Distributed Systems1.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Network Security Celia Li Computer Science and Engineering York University.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Cryptographic Hash Function
Introduction to Security
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Presentation transcript:

Introduction to SECURITY By, Harsha Thota Advisor: Dr. Zhang

Outline  Introduction  Security Threats, Policies, Mechanisms  Design Issues  Cryptography

Introduction  Security – difficult to get right, impossible to get perfect!  In earlier chapters, we discussed on different principles like synchronization, consistency and replication, fault tolerance. The last principle is SECURITY.  Security is one of the most important principles and also the most difficult principle to implement.  A single flaw in the design of security will make all the security measures useless.  We discuss on various mechanisms incorporated in the distributed systems to support security.

Basic Issues in Security  Building all kinds of security mechanisms into a system does not really make sense unless it is known how those mechanisms are to be used, and against what. This requires that we know about the security policy that is to be enforced.  Security in distributed systems can roughly be divided into two parts:  One part concerns the communication between users or processes, possibly residing on different machines. The principal mechanism for ensuring secure communication is that of a secure channel.  The other part is authorization, which deals with ensuring that a process gets only those access rights to the resources in a distributed system it is entitled to.

We start our description of security in distributed systems by taking a look at some general security issues.  First, we need to define what a secure system is and know the difference between security policies and security mechanisms.  Our second concern is to consider some general design issues for secure systems.  Finally, we briefly discuss some cryptographic algorithms, which play a key role in the design of security protocols.

Security Threats, Policies, and Mechanisms  Security in a computer system is strongly related to the notion of dependability. a dependable computer system is one that we justifiably trust to deliver its services.  Dependability includes availability, reliability, safety, and maintainability. However, if we are to put our trust in a computer system, then confidentiality and integrity should also be taken into account.  Confidentiality refers to the property of a computer system whereby its information is disclosed only to authorized parties.  Integrity is the characteristic that alterations to a system's assets can be made only in an authorized way.

Another way of looking at security in computer systems is that we attempt to protect the services and data it offers against security threats. There are four types of security threats to consider:  Interception: refers to the situation that an unauthorized party has gained access to a service or data. A typical example of interception is where communication between two parties has been overheard by someone else; or when data is illegally copied.  Interruption: refers to the situation in which services or data become unavailable, unusable, destroyed. An example of interruption is when a file is corrupted or lost or denial of service attacks making a service unusable.  Modification: involves unauthorized changing of data or tampering with a service so that it no longer adheres to its original specifications. Examples of modifications include intercepting and subsequently changing transmitted data, tampering with database entries, and changing a program so that it secretly logs the activities of its user.

 Fabrication: refers to the situation in which additional data or activity are generated that would normally not exist. For example, an intruder may attempt to add an entry into a password file or database.  A security policy describes precisely which actions the entities(users, services, data) in a system are allowed to take and which ones are prohibited.  Once a security policy has been laid down, it becomes possible to concentrate on the security mechanisms by which a policy can be enforced.  Important security mechanisms are: Encryption, Authentication, Authorization, Auditing.

 Encryption is fundamental to computer security. Encryption transforms data into something an attacker cannot understand. Encryption provides a means to implement data confidentiality. In addition, encryption allows us to check whether data have been modified.  Authentication is used to verify the claimed identity of a user, client, server, host, or other entity. Users are authenticated by means of passwords.  In the case of clients, the basic premise is that before a service starts to perform any work on behalf of a client, the service must learn the client's identity.  After a client has been authenticated, it is necessary to check whether that client is authorized to perform the action requested.  Auditing tools are used to trace which clients accessed what, and which way. Although auditing does not really provide any protection against security threats, audit logs can be extremely useful for the analysis of a security breach, and subsequently taking measures against intruders.

The Globus Security Architecture  Globus is a system supporting largescale distributed computations in which many hosts, files, and other resources are simultaneously used for doing a computation.  Such environments are also referred to as computational grids. Resources in these grids are often located in different administrative domains that may be located in different parts of the world.  Because users and resources are vast in number and widely spread across different administrative domains, security is essential. To devise and properly use security mechanisms, it is necessary to understand what exactly needs to be protected, and what the assumptions are with respect to security.

Globus Security Policy The security policy for Globus entails the following eight statements:  The environment consists of multiple administrative domains.  Local operations (i.e., operations that are carried out only within a single domain) are subject to a local domain security policy only.  Global operations (i.e., operations involving several domains) require the initiator to be known in each domain where the operation is carried out.  Operations between entities in different domains require mutual authentication.  Global authentication replaces local authentication.  Controlling access to resources is subject to local security only.  Users can delegate rights to processes.  A group of processes in the same domain can share credentials.

 Globus assumes that the environment consists of multiple administrative domains, where each domain has its own local security policy.  It is assumed that local policies cannot be changed just because the domain participates in Globus, nor can the overall policy of Globus override local security decisions.  If an operation is initiated and carried out within a single domain, all security issues will be carried out using local security measures only. Globus will not impose additional measures.  The Globus security policy states that requests for operations can be initiated either globally or locally. The initiator, be it a user or process acting on behalf of a user, must be locally known within each domain where that operation is carried out.  An important policy statement is that operations between entities in different domains require mutual authentication. This means, for example, that if a user in one domain makes use of a service from another domain, then the identity of the user will have to be verified.

 If the identity of a user has been verified, and that user is also known locally in a domain, then he can act as being authenticated for that local domain.  Once a user (or process acting on behalf of a user) has been authenticated, it is still necessary to verify the exact access rights with respect to resources.  Consider a mobile agent in Globus that carries out a task by initiating several operations in different domains, one after another. Such an agent may take a long time to complete its task. To avoid having to communicate with the user on whose behalf the agent is acting, Globus requires that processes can be delegated a subset of the user's rights.  Globus requires that groups of processes running with a single domain and acting on behalf of the same user may share a single set of credentials.  The security policy indicates that the important design issues are the representation of a user in a remote domain, and the allocation of resources from a remote domain to a user or his representative. What Globus therefore primarily needs, are mechanisms for cross-domain authentication, and making a user known in remote domains.  For this purpose, two types of representatives are introduced. A user proxy is a process that is given permission to act on behalf of a user for a limited period of time. Resources are represented by resource proxies. A resource proxy is a process running within a specific domain that is used to translate global operations on a resource into local operations that comply with that particular domain's security policy.

Globus Security Architecture

 The first protocol describes precisely how a user can create a user proxy and delegate rights to that proxy. He gives a set of credentials to the user proxy.  The second protocol specifies how a user proxy can request the allocation of a resource in a remote domain. Resources are represented by resource proxies. the protocol tells a resource proxy to create a process in the remote domain after mutual authentication has taken place. That process represents the user (just as the user proxy did), but operates in the same domain as the requested resource.  A process created in a remote domain may initiate additional computations in other domains. The fourth and last protocol in the Globus security architecture is the way a user can make himself known in a domain. Assuming that a user has an account in a domain, what needs to be established is that the system wide credentials as held by a user proxy are automatically converted to credentials that are recognized by the specific domain. The protocol prescribes how the mapping between the global credentials and the local ones can be registered by the user in a mapping table local to that domain.

Design Issues  A distributed system, or any computer system for that matter, must provide security services by which a wide range of security policies can be implemented. There are a number of important design issues that need to be taken into account when implementing general-purpose security services. They are:  Focus of Control.  Layering of Security Mechanisms.  Simplicity.

Focus of Control  Three approaches for protection against security threats.  Protection against invalid operations  is to concentrate directly on the protection of the data that is associated with the application.  Protection against unauthorized invocations  is to concentrate on protection by specifying exactly which operations may be invoked, and by whom, when certain data or resources are to be accessed.  Protection against unauthorized users.  to focus directly on users by taking measures by which-only specific people have access to the application.

Layering of Security Mechanisms  An important issue in designing secure systems is to decide at which level security mechanisms should be placed.

 The above figure separates the general-purpose services from communication services.  This separation is important for understanding the layering of security in distributed systems and, in particular, the notion of trust.  A system is either secure or it is not but whether a client considers a system to be secure is a matter of trust.  Example Consider an organization located at different sites that are connected through a communication service such as Switched Multi-megabit Data Service ( SMDS ). An SMDS network can be thought of as a link-level backbone connecting various local-area networks at possibly geographically dispersed sites.

 Security can be provided by placing encryption devices at each SMDS router. These devices automatically encrypt and decrypt packets that are sent between sites, but do not otherwise provide secure communication between hosts at the same site. If Alice at site A sends a message to Bob at site B, and she is worried about her message being intercepted, she must at least trust the encryption of intersite traffic to work properly.  f the encryption mechanisms cannot be trusted, additional mechanisms can be employed by clients to provide the level of trust required (e.g., using SSL (Secure Sockets Layer). Secure Sockets Layer and can be used to securely send messages across a TCP connection.

Distribution of Security Mechanisms  Dependencies between services regarding trust lead to the notion of a Trusted Computing Base (TCB).  A TCB is the set of all security mechanisms in a (distributed) computer system that are needed to enforce a security policy.  An approach is to separate security services from other types of services by distributing services across different machines depending on amount of security required.  This separation effectively reduces the TCB to a relatively small number of machines and software components. By subsequently protecting those machines against security attacks from the outside, overall trust in the security of the distributed system can be increased.

Reduced Interfaces for Secure System Components (RISSC)  Prevents clients and their applications from direct access to critical services.  Any security-critical server is placed on a separate machine isolated from end-user systems using low-level secure network interfaces.  Clients and their applications run on different machines and can access the secured server only through these network interfaces. The principle of RISSC as applied to secure distributed systems.

Simplicity  Designing a secure computer system is difficult, regardless of whether it is also a DS.  Using a few simple mechanisms that are easily understood and trusted to work is the ideal situation.  Real world - introducing security mechanisms to an already complex system can make matters worse.  However, this is still a design goal to aim for!  Simplicity will contribute to the trust that end users will put into the application and, more importantly, will contribute to convincing the designers that the system has no security holes.

Cryptography  Fundamental to security in distributed systems is the use of cryptographic techniques. The basic idea of applying these techniques is simple.  Consider a sender S wanting to transmit message m to a receiver R. To protect the message against security threats, the sender first encrypts it into an unintelligible message m', and subsequently sends m' to R. R, in turn, must decrypt the received message into its original form m.  Encryption and decryption are accomplished by using cryptographic methods parameterized by keys.  The original form of the message that is sent is called the plaintext ; the encrypted form is referred to as the ciphertext.

 Following the common notational conventions, we will use  C = EK (P) to denote that the ciphertext C is obtained by encrypting the plaintext P using key K.  P = DK( C) is used to express the decryption of the ciphertext C using key K, resulting in the plaintext P.  While transferring a message as ciphertext C, there are three different attacks that we need to protect against, and for which encryption helps.  First, an intruder may intercept the message without either the sender or receiver being aware that eavesdropping is happening. if the transmitted message has been encrypted in such a way that it cannot be easily decrypted without having the proper key, interception is useless. The intruder will see only unintelligible data.  The second type of attack that needs to be dealt with is that of modifying the message. Modifying plaintext is easy; modifying ciphertext that has been properly encrypted is much more difficult because the intruder will first have to decrypt the message before he can meaningfully modify it. In addition, he will also have to properly encrypt it again or otherwise the receiver may notice that the message has been tampered with.  The third type of attack is when an intruder inserts encrypted messages into the communication system, attempting to make R believe these messages came from S.

Types of Cryptosystems:  Symmetric: often referred to as conventional cryptography, defined as:  Symmetric cryptosystems are also referred to as secret-key or shared-key systems,  because the sender and receiver are required to share the same key, and to ensure that protection works,  this shared key must be kept secret; no one else is allowed to see the key.  We will use the notation K A,B to denote a key shared by A and B.

Types of Cryptosystems:  Asymmetric: often referred to as public-key cryptography, defined as:  The keys for encryption and decryption are different, but together form a unique pair.  There is a separate key K E for encryption and one for decryption, K D, such that  One of the keys in an asymmetric cryptosystem is kept private; the other is made public.  Notation to denote a public key belonging to A, and as its corresponding private key.

Notation used in cryptography

Introducing Alice, Bob & Co.  Alice and Bob are the good guys.  Chuck and Eve are usually the bad guys.  Example 1: Bob and Alice  Alice wants to send a confidential message to Bob  She should use Bob's public key to encrypt the message.  Because Bob is the only one holding the private decryption key, he is also the only person that can decrypt the message.  Example 2: Bob and Alice Redux  Bob wants to know for sure that the message he just received actually came from Alice.  Alice can keep her encryption key private to encrypt the messages she sends.  If Bob can successfully decrypt a message using Alice's public key (and the plaintext in the message has enough information to make it meaningful to Bob), he knows that message must have come from Alice, because the decryption key is uniquely tied to the encryption key.

Hash (One-Way) Functions  One final application of cryptography in distributed systems is the use of hash functions.  A hash function H takes a message m of arbitrary length as input and produces a bit string h having a fixed length as output:  h = H (m)  Comparable to the extra bits appended in the CRC.  Hash Functions are one way functions, which means given H and h, it is computationally infeasible to compute m.  They have the weak collision resistance property, given m and h = H( m ), it is hard to find another m, say, m2, such that m and m2 produce the same h.  They also have strong collision resistance property, given H, it is infeasible to find an m and an m2 such that H( m ) and H( m2 ) produce the same value

Symmetric Cryptosystems: DES  Our first example of a cryptographic algorithm is the Data Encryption Standard (DES), which is used for symmetric cryptosystems.  Used for symmetric cryptosystems  DES is designed to operate on 64-bit blocks of data.  A block is transformed into an encrypted (64 bit) block of output in 16 rounds, where each round uses a different 48-bit key for encryption.  Each of these 16 keys is derived from a 56-bit master key  Before an input block starts its 16 rounds of encryption, it is first subject to an initial permutation, of which the inverse is later applied to the encrypted output leading to the final output block.

 (a) The principle of DES.  (b) Outline of one encryption round.

 Each encryption round i takes the 64-bit block produced by the previous round (i - 1) as its input.  The 64 bits are split into a left part Li-1 and a right part Ri-1, each containing 32 bits.  The right part is used for the left part in the next round, that is, Li = Ri-1.  Work is done in the mangler function f.  This function takes a 32-bit block Ri-1 as input, together with a 48-bit key Ki, and produces a 32-bit block that is XORed with Li-1 to produce Ri.  The mangler function first expands Ri-1 to a 48-bit block and XORs it with Ki.  The result is partitioned into eight chunks of six bits each.  Each chunk is then fed into a different S-box, which is an operation that substitutes each of the 64 possible 6-bit inputs into one of 16 possible 4-bit outputs.  The eight output chunks of four bits each are then combined into a 32-bit value and permuted again.

 The 48-bit key Ki for round i is derived from the 56-bit master key as follows  First, the master key is permuted and divided into two 28-bit halves.  For each round, each half is first rotated one or two bits to the left, after which 24 bits are extracted.  Together with 24 bits from the other rotated half, a 48-bit key is constructed.  Details of per-round key generation in DES.

Principle of DES is quite simple:  Algorithm is difficult to break using analytical methods.  Brute-force attack by simply searching for a key that will do the job has become easy as has been demonstrated a number of times.  DES three times in a special encrypt-decrypt-encrypt mode with different keys, also known as Triple DES is much more safe and is still often used

Public-Key Cryptosystems: RSA  Security of RSA - no methods are known to efficiently find the prime factors of large numbers.  It can be shown that each integer can be written as the product of prime numbers.  For example, 2100 can be written as 2100 = 2 x 2 x 3 x 5 x 5 x 7 making 2, 3, 5, and 7 the prime factors in  Private and public keys are constructed from very large prime numbers (consisting of hundreds of decimal digits).  Breaking RSA is equivalent to finding those two prime numbers.  So far, this has shown to be computationally infeasible despite mathematicians working on the problem for centuries.

 Generating the private and public key requires four steps:  Choose two very large prime numbers, p and q.  Compute n = p x q and z = (p – 1) x (q – 1).  Choose a number d that is relatively prime to z.  Compute the number e such that e x d = 1 mod z.  One of the numbers, say d, can subsequently be used for decryption, whereas e is used for encryption.  Only one of these two is made public, depending on what the algorithm is being used for.

Hash Functions: MD5  MD5 is a hash function for computing a 128-bit, fixed length message digest from an arbitrary length binary input string.  The input string is first padded to a total length of 448 bits (modulo 512), after which the length of the original bit string is added as a 64-bit integer.  In effect, the input is converted to a series of 512-bit blocks.  Starting with some constant 128-bit value, the algorithm proceeds in k phases, where k is the number of 512-bit blocks comprising the padded message.  During each phase, a 128-bit digest is computed out of a 512-bit block of data coming from the padded message, and the 128-bit digest computed in the preceding phase.

The structure of MD5 algorithm.  A phase in MD5 consists of four rounds of computations, where each round uses one of the following four functions: i.F(x.y.z) = (x AND y) OR «NOT x) AND z) ii.G (r.y.z) = (x AND z) OR (y AND (NOT z) iii.Htx.y.z) =x XOR y XOR z iv.I (z.y.z) =y XOR (x OR (NOT z)  Each of these functions operates on 32-bit variables x, y, and z.  Consider a 512-bit block b from the padded message that is being processed during phase k.  Block b is divided into bit sub blocks b0,b1,...,b15.  During the first round, function F is used to change four variables (denoted as p, q, r, and s, respectively) in 16 iterations  These variables are carried to each next round, and after a phase has finished, passed on to the next phase.  There are a total of 64 predefined constants Ci.  The notation x <<< n is used to denote a left rotate: the bits in x are shifted n positions to the left, where the bit shifted off the left is placed in the rightmost position.

 The 16 iterations during the first round in a phase in MD5.

 The second round uses the function G in a similar fashion, whereas H and I are used in the third and fourth round, respectively.  Each step thus consists of 64 iterations, after which the next phase is started, but now with the values that p, q, r, and s have at that point.

Future Work  The Role of Trust Management in Distributed Systems Security can be improved so that the client’s can have more trust on the systems.  In the future work, we will investigate the level of knowledge about a distributed environment which might be required by monitoring systems to gather information necessary for adaptation purposes and how this knowledge can be exploited by intruders to cause security threats in the situations like token ring.  The communication between the systems has to be more effective and all the communication between the systems should be authenticated with authorized entities. All the authorized entities should have proper credentials to enhance security.

Further Study in Security  Secure Channels  Access Control  Security Management

References         DISTRIBUTED SYSTEMS Second Edition by Andrew S.Tanenbaum, Maarten Van Steen   

Thank You