Skip to main content

Protection and security issues for future systems

  • Conference paper
  • First Online:
Operating Systems of the 90s and Beyond

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 563))

Abstract

In the coming years an increasing number of services will become available by computer. Many of these services will require interaction between parties that do not completely trust one another. Computer networks and the systems connected to them will, in effect, become an electronic marketplace. The users of such systems will demand protection from the actions of others.

Many of these protections can be provided by computer-based mechanisms analogous to the mechanisms that protect individuals in society. Among the protections to be supported are authentication, authorization, accounting, assurance, and audit. Some of the mechanisms that provide these protections have been described in this paper. The future of these mechanism will depend on building the infrastructure that will support their widespread use.

The growing use of computers in daily life has the potential to increase the accessibility of information that individuals might prefer to keep private. Future computer systems should incorporate mechanisms that support the preservation of individual privacy.

The author's research was supported in part by the National Science Foundation (Grant No. CCR-8619663), the Washington Technology Centers, and Digital Equipment Corporation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi, M. Burrows, C. Kaufman, and B. Lampson. Authentication and delegation with smart-cards. Technical Report 67, Digital Equipment Corporation Systems Research Center, November 1990.

    Google Scholar 

  2. CCITT. Recommendation X.509: The directory authentication framework, December 1988.

    Google Scholar 

  3. Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–654, November 1976.

    Article  Google Scholar 

  4. M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The Digital distributed system security architecture. In Proceedings of the 1989 National Computer Security Conference, pages 305–319, 1989.

    Google Scholar 

  5. B. W. Lampson. Protection. In Proceedings of the 5th Princeton Symposium on Information Sciences and Systems, March 1971.

    Google Scholar 

  6. T. Mark Lomas, Li Gong, Jerome H. Saltzer, and Roger M. Needham. Reducing risks from poorly chosen keys. In Proceedings of the 12th ACM Symposium on Operating Systems Principles, pages 15–18, December 1989.

    Google Scholar 

  7. S. J. Mullender. Principles of Distributed Operating System Design. PhD thesis, Vrije Universiteit, Amsterdam, October 1985.

    Google Scholar 

  8. Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communication of the ACM, 21(12):993–999, December 1978.

    Article  Google Scholar 

  9. B. Clifford Neuman. Proxy-based authorization and accounting for distributed systems. Technical Report 91-02-01, Department of Computer Science and Engineering, University of Washington, March 1991.

    Google Scholar 

  10. M. M. Pozzo and T. E. Gray. A model for the containment of computer viruses. In Proceedings of the 2nd Aerospace Computer Security Conference, pages 11–18, December 1986.

    Google Scholar 

  11. R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120–126, February 1978.

    Article  Google Scholar 

  12. Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9), September 1975.

    Google Scholar 

  13. Karen R. Sollins. Cascaded authentication. In Proceedings of the 1988 IEEE Symposium on Research in Security and Privacy, pages 156–163, April 1988.

    Google Scholar 

  14. J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 Usenix Conference, pages 191–201, February 1988. Dallas, Texas.

    Google Scholar 

  15. Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren, Gregory J. Sharp, Sape J. Mullender, Jack Jansen, and Guido van Rossum. Experience with the Amoeba distributed operating system. Communications of the ACM, 33(12):47–63, December 1990.

    Article  Google Scholar 

  16. J. Tardo and K. Alagappan. SPX: Global authentication using public key certificates. In Proceedings of the IEEE Symposium on Security and Privacy, May 1991.

    Google Scholar 

  17. V. L. Voydock and S. T. Kent. Security mechanisms in high level network protocols. ACM Computing Surveys, 15(2), June 1983.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Clifford Neuman .

Editor information

Arthur Karshmer Jürgen Nehmer

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Clifford Neuman, B. (1991). Protection and security issues for future systems. In: Karshmer, A., Nehmer, J. (eds) Operating Systems of the 90s and Beyond. Lecture Notes in Computer Science, vol 563. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0024542

Download citation

  • DOI: https://doi.org/10.1007/BFb0024542

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-54987-1

  • Online ISBN: 978-3-540-46630-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics