Check out the new USENIX Web site. next up previous
Next: Validating and Revoking Statements Up: The CRISIS Wide Area Architecture Previous: Background

System Architecture

The goals of the CRISIS architecture can be described in two parts. First, users should be allowed secure access to global resources such as files, CPU cycles, or storage from anywhere in the world. Next, resource providers need mechanisms for authenticating those requesting their services and for authorizing those with the proper credentials. In this section, we provide a high-level view of the system architecture before detailing example usage in the next section.

In the following discussion, we assume the presence of three basic entities, adapted from the SRC logic [Lampson et al. 1991]:


  
Figure 1: This figure describes a sample scenario where a user, P1 requests a machine P2 to run a job on its behalf. In turn P2 sub-contracts a portion of the job to another machine P3 in a separate administrative domain.
\begin{figure}
\begin{center}

\scalebox {0.7}{\includegraphics{example.eps}}
\end{center}\small\em\end{figure}

Consider the scenario where a user in California wishes to run a job at Texas which requires access to two input files. In turn, the job at Texas decides to subcontract a portion of its work to a machine in Washington. This sub-contracted work only needs access to the second input file. More formally, P1 is a user in California, while P2 and P3 are machines willing to run jobs located at Texas and Washington respectively. O1 and O2 are objects (e.g. input files) located in California, with RM1 and RM2 their associated reference monitors. Assuming that P1 (and only P1) possesses access privileges to O1 and O2, consider the following sequence of events (summarized in Figure 1):

P1 states that P2 can access O1 and O2 until time T1.
P1 requests that P2 execute a job on its behalf (steps 1 and 2).
P2 requests access to O1 from RM1 (step 3).
P2 states that P3 can access O2 until time T2.
P2 requests that P3 execute a job on its behalf (steps 4 and 5).
P3 requests access to O2 from RM2 (step 6).

To carry out the above scenario in WebOS, the security system must support:

Our solutions to each of the above are described in the following subsections.



 
next up previous
Next: Validating and Revoking Statements Up: The CRISIS Wide Area Architecture Previous: Background
Amin Vahdat
12/10/1997