Skip to main content

Abstract

Authentication and authorization turned out to be of central concern in resource sharing networks. It must be expected, that the willingness of an institution to contribute its equipment to such a network greatly depends on the protection mechanisms provided. We start with discussing a number of alternative approaches and solutions for the authorization and authentication problem. The conclusions drawn from these discussions form the basis for the design of the DAC Authentication and Authorization System which is described next. Emphasis has thereby been laid on the clearness of concepts and on operational robustness of the resulting system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H. Eberle, K. Geihs, A. Schilt, B. Schöner, H. Schmutz: Generic Support for Distributed Processing in Heterogeneous Networks. In this volume

    Google Scholar 

  2. U. Hallberg, E. Krämer: Transparent Access to Remote Files in Heterogeneous Networks. In this volume

    Google Scholar 

  3. ISO/CCITT: The Directory - Part 8: Authentication Framework. ISO/TC97/SC21 N2057, (July 1987)

    Google Scholar 

  4. C.S. Kline, G.J.Popek: Public Key vs. Conventional Key Encryption. Proc. of the National Computer Conference, Vol. 48, (1979)

    Google Scholar 

  5. B. Mattes, H. v. Drachenfels: Directories and Orientation in Heterogeneous Networks. In this volume

    Google Scholar 

  6. S.J. Mullender, A.S. Tanenbaum: The Design of a Capability Based Distributed Operating System. The Computer Journal, Vol. 29, No. 4, (1986)

    Google Scholar 

  7. I. Nassi: The Liberty Net: An Architectural Overview. IEEE Proc. COMPCON Fall 82: Computer Networks, (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1988 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mattes, B. (1988). Authentication and Authorization in Resource Sharing Networks. In: Krüger, G., Müller, G. (eds) Hector Heterogeneous Computers Together A Joint Project of IBM and the University of Karlsruhe. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-73574-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-73574-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-19137-7

  • Online ISBN: 978-3-642-73574-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics