Practical authentication for distributed computing
- 1 January 1990
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Issues related to authentication in a distributed computing environment are discussed. Authentication approaches used in Digital Equipment Corporation's Distributed System Security Architecture (DSSA) are described. Node, user, and process granularity authentication concerns are considered. Authentication is based on a global hierarchic naming structure and public-key cryptography. Directory-resident certificates associating entities with long-term keys are used in conjunction with dynamically signed certificates which represent transient bindings between entities. Distributed system elements can be mutually suspicious. At the node level, special topics considered include the relationship between authentication and secure loading and the relationship between authentication and rule-based policy support. At the user level, architecture requirements are identified and authentication protocol options based on smart cards and on user-entered passwords are described.Keywords
This publication has 9 references indexed in Scilit:
- A secure distributed operating systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- An architecture for practical delegation in a distributed systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Reducing risks from poorly chosen keysPublished by Association for Computing Machinery (ACM) ,1989
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Factors Affecting Distributed System SecurityIEEE Transactions on Software Engineering, 1987
- A Global Authentication Service without Global TrustPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- An Analysis Of The Differences Between The Computer Security Fractices In The Military And Private SectorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978