DocumentCode :
1154416
Title :
Authentication for distributed systems
Author :
Woo, Thomas Y C ; Lam, Simon S.
Author_Institution :
Texas Univ., Austin, TX, USA
Volume :
25
Issue :
1
fYear :
1992
Firstpage :
39
Lastpage :
52
Abstract :
A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failures are addressed, and an authentication framework is provided. As case studies, two authentication services, Kerberos and SPX, are examined.<>
Keywords :
distributed processing; protocols; security of data; Kerberos; SPX; authentication; distributed systems; general identity authentication; message content authentication; message origin authentication; protocols; Authentication; Clocks; Communication system security; Cryptography; Distributed computing; Law; Legal factors; Protocols; Synchronization; Tagging;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/2.108052
Filename :
108052
Link To Document :
بازگشت