Security model for distributed computing system
a distributed computing system and security model technology, applied in the field of distributed computing system security model management and security model, can solve the problems of network latency, system overall quantity may increase, decentralisation itself may be problematic, etc., and achieve the effect of a highly efficient and scalable method
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014]Specific embodiments of the disclosure are now described, by way of example, with reference to the accompanying drawings, of which:
[0015]FIG. 1 shows multiple clients interacting with a central server;
[0016]FIG. 2 shows multiple clients interacting with a distributed computing architecture providing the same services as the central server of FIG. 1;
[0017]FIG. 3 shows schematically a distributed transaction architecture using a four party model;
[0018]FIG. 4 illustrates elements of a complex distributed system adapted to implement the transaction architecture of FIG. 3;
[0019]FIG. 5 shows schematically an exemplary system for enabling digital transactions in the transaction architecture of FIGS. 3 and 4;
[0020]FIG. 6 illustrates schematically an arrangement for a distributed system for digital enablement of transactions;
[0021]FIG. 7 illustrates a computing node of the arrangement of FIG. 6 in more detail;
[0022]FIG. 8 illustrates elements within the computing node of FIG. 7;
[0023]F...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


