Abstract
In the coming years an increasing number of services will become available by computer. Many of these services will require interaction between parties that do not completely trust one another. Computer networks and the systems connected to them will, in effect, become an electronic marketplace. The users of such systems will demand protection from the actions of others.
Many of these protections can be provided by computer-based mechanisms analogous to the mechanisms that protect individuals in society. Among the protections to be supported are authentication, authorization, accounting, assurance, and audit. Some of the mechanisms that provide these protections have been described in this paper. The future of these mechanism will depend on building the infrastructure that will support their widespread use.
The growing use of computers in daily life has the potential to increase the accessibility of information that individuals might prefer to keep private. Future computer systems should incorporate mechanisms that support the preservation of individual privacy.
The author's research was supported in part by the National Science Foundation (Grant No. CCR-8619663), the Washington Technology Centers, and Digital Equipment Corporation.
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi, M. Burrows, C. Kaufman, and B. Lampson. Authentication and delegation with smart-cards. Technical Report 67, Digital Equipment Corporation Systems Research Center, November 1990.
CCITT. Recommendation X.509: The directory authentication framework, December 1988.
Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–654, November 1976.
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The Digital distributed system security architecture. In Proceedings of the 1989 National Computer Security Conference, pages 305–319, 1989.
B. W. Lampson. Protection. In Proceedings of the 5th Princeton Symposium on Information Sciences and Systems, March 1971.
T. Mark Lomas, Li Gong, Jerome H. Saltzer, and Roger M. Needham. Reducing risks from poorly chosen keys. In Proceedings of the 12th ACM Symposium on Operating Systems Principles, pages 15–18, December 1989.
S. J. Mullender. Principles of Distributed Operating System Design. PhD thesis, Vrije Universiteit, Amsterdam, October 1985.
Roger M. Needham and Michael D. Schroeder. Using encryption for authentication in large networks of computers. Communication of the ACM, 21(12):993–999, December 1978.
B. Clifford Neuman. Proxy-based authorization and accounting for distributed systems. Technical Report 91-02-01, Department of Computer Science and Engineering, University of Washington, March 1991.
M. M. Pozzo and T. E. Gray. A model for the containment of computer viruses. In Proceedings of the 2nd Aerospace Computer Security Conference, pages 11–18, December 1986.
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120–126, February 1978.
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9), September 1975.
Karen R. Sollins. Cascaded authentication. In Proceedings of the 1988 IEEE Symposium on Research in Security and Privacy, pages 156–163, April 1988.
J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 Usenix Conference, pages 191–201, February 1988. Dallas, Texas.
Andrew S. Tanenbaum, Robbert van Renesse, Hans van Staveren, Gregory J. Sharp, Sape J. Mullender, Jack Jansen, and Guido van Rossum. Experience with the Amoeba distributed operating system. Communications of the ACM, 33(12):47–63, December 1990.
J. Tardo and K. Alagappan. SPX: Global authentication using public key certificates. In Proceedings of the IEEE Symposium on Security and Privacy, May 1991.
V. L. Voydock and S. T. Kent. Security mechanisms in high level network protocols. ACM Computing Surveys, 15(2), June 1983.
Author information
Authors and Affiliations
Corresponding author
Editor information
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clifford Neuman, B. (1991). Protection and security issues for future systems. In: Karshmer, A., Nehmer, J. (eds) Operating Systems of the 90s and Beyond. Lecture Notes in Computer Science, vol 563. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0024542
Download citation
DOI: https://doi.org/10.1007/BFb0024542
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54987-1
Online ISBN: 978-3-540-46630-7
eBook Packages: Springer Book Archive