Authentication for distributed systems
- 1 January 1992
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Computer
- Vol. 25 (1) , 39-52
- https://doi.org/10.1109/2.108052
Abstract
A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failures are addressed, and an authentication framework is provided. As case studies, two authentication services, Kerberos and SPX, are examined.Keywords
This publication has 12 references indexed in Scilit:
- Applying a theory of modules and interfaces to security verificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- SPX: global authentication using public key certificatesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logic of authenticationACM Transactions on Computer Systems, 1990
- An architecture for practical delegation in a distributed systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Zero knowledge proofs of identityPublished by Association for Computing Machinery (ACM) ,1987
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Symmetric and Asymmetric EncryptionACM Computing Surveys, 1979
- Privacy and authentication: An introduction to cryptographyProceedings of the IEEE, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978