Authentication and Authorization in Resource Sharing Networks
Authentication and authorization turned out to be of central concern in resource sharing networks. It must be expected, that the willingness of an institution to contribute its equipment to such a network greatly depends on the protection mechanisms provided. We start with discussing a number of alternative approaches and solutions for the authorization and authentication problem. The conclusions drawn from these discussions form the basis for the design of the DAC Authentication and Authorization System which is described next. Emphasis has thereby been laid on the clearness of concepts and on operational robustness of the resulting system.
Unable to display preview. Download preview PDF.
- EBE88.H. Eberle, K. Geihs, A. Schilt, B. Schöner, H. Schmutz: Generic Support for Distributed Processing in Heterogeneous Networks. In this volumeGoogle Scholar
- HOL88.U. Hallberg, E. Krämer: Transparent Access to Remote Files in Heterogeneous Networks. In this volumeGoogle Scholar
- ISO87.ISO/CCITT: The Directory - Part 8: Authentication Framework. ISO/TC97/SC21 N2057, (July 1987)Google Scholar
- KLI79.C.S. Kline, G.J.Popek: Public Key vs. Conventional Key Encryption. Proc. of the National Computer Conference, Vol. 48, (1979)Google Scholar
- MAT88.B. Mattes, H. v. Drachenfels: Directories and Orientation in Heterogeneous Networks. In this volumeGoogle Scholar
- MUL86.S.J. Mullender, A.S. Tanenbaum: The Design of a Capability Based Distributed Operating System. The Computer Journal, Vol. 29, No. 4, (1986)Google Scholar
- NAS82.I. Nassi: The Liberty Net: An Architectural Overview. IEEE Proc. COMPCON Fall 82: Computer Networks, (1982)Google Scholar