Authentication in distributed systems
- 1 October 1993
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 27 (4) , 31-41
- https://doi.org/10.1145/163640.163643
Abstract
Security of distributed systems is a topic of growing importance. The security breaches of the last few years (internet worm .... ) have demonstrated the need for additional research in this area. One important aspect of security is authentication. It is fundamental to access control, accounting and secure communication. This bibliography cont~s references of protocol descriptions and of protocol analysis efforts.Keywords
This publication has 44 references indexed in Scilit:
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A nonce-based protocol for multiple authenticationsACM SIGOPS Operating Systems Review, 1992
- Asymmetric user authenticationComputers & Security, 1992
- An automatic search for security flaws in key management schemesComputers & Security, 1992
- Security in open networks and distributed systemsComputer Networks and ISDN Systems, 1991
- High-level security architectures and the Kerberos systemComputer Networks and ISDN Systems, 1990
- Verification of network security protocolsComputers & Security, 1989
- Expert systems applied to the analysis of key management schemesComputers & Security, 1987
- Authentication protocols for computer networks: IComputer Networks and ISDN Systems, 1986
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983