Authentication and Authorization in Resource Sharing Networks

  • Bruno Mattes
Conference paper


Authentication and authorization turned out to be of central concern in resource sharing networks. It must be expected, that the willingness of an institution to contribute its equipment to such a network greatly depends on the protection mechanisms provided. We start with discussing a number of alternative approaches and solutions for the authorization and authentication problem. The conclusions drawn from these discussions form the basis for the design of the DAC Authentication and Authorization System which is described next. Emphasis has thereby been laid on the clearness of concepts and on operational robustness of the resulting system.


Access Control Mutual Authentication Authentication Server Login Request Access Control Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. EBE88.
    H. Eberle, K. Geihs, A. Schilt, B. Schöner, H. Schmutz: Generic Support for Distributed Processing in Heterogeneous Networks. In this volumeGoogle Scholar
  2. HOL88.
    U. Hallberg, E. Krämer: Transparent Access to Remote Files in Heterogeneous Networks. In this volumeGoogle Scholar
  3. ISO87.
    ISO/CCITT: The Directory - Part 8: Authentication Framework. ISO/TC97/SC21 N2057, (July 1987)Google Scholar
  4. KLI79.
    C.S. Kline, G.J.Popek: Public Key vs. Conventional Key Encryption. Proc. of the National Computer Conference, Vol. 48, (1979)Google Scholar
  5. MAT88.
    B. Mattes, H. v. Drachenfels: Directories and Orientation in Heterogeneous Networks. In this volumeGoogle Scholar
  6. MUL86.
    S.J. Mullender, A.S. Tanenbaum: The Design of a Capability Based Distributed Operating System. The Computer Journal, Vol. 29, No. 4, (1986)Google Scholar
  7. NAS82.
    I. Nassi: The Liberty Net: An Architectural Overview. IEEE Proc. COMPCON Fall 82: Computer Networks, (1982)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1988

Authors and Affiliations

  • Bruno Mattes
    • 1
  1. 1.Institut für Betriebs- und DialogsystemeUniversität KarlsruheKarlsruhe 1Germany

Personalised recommendations