Authentication in distributed systems

作者: Butler Lampson , Martín Abadi , Michael Burrows , Edward Wobber

DOI: 10.1145/121133.121160

关键词:

摘要: We describe a theory of authentication and system that implements it. Our is based on the notion principal "speaks for" relation between principals. A simple either has ...

参考文章(12)
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
J. H. Saltzer, D. P. Reed, D. D. Clark, End-to-end arguments in system design ACM Transactions on Computer Systems. ,vol. 2, pp. 277- 288 ,(1984) , 10.1145/357401.357402
Don Davis, Ralph Swick, Network security via private-key certificates Operating Systems Review. ,vol. 24, pp. 64- 67 ,(1990) , 10.1145/94574.94579
P. G. Comba, Exponentiation cryptosystems on the IBM PC IBM Systems Journal. ,vol. 29, pp. 526- 538 ,(1990) , 10.1147/SJ.294.0526
Dorothy E. Denning, A lattice model of secure information flow Communications of the ACM. ,vol. 19, pp. 236- 243 ,(1976) , 10.1145/360051.360056
M. Gasser, E. McDermott, An architecture for practical delegation in a distributed system ieee symposium on security and privacy. pp. 20- 30 ,(1990) , 10.1109/RISP.1990.63835
M. Shand, P. Bertin, J. Vuillemin, Hardware speedups in long integer multiplication acm symposium on parallel algorithms and architectures. pp. 138- 145 ,(1990) , 10.1145/97444.97679
J.J. Tardo, K. Alagappan, SPX: global authentication using public key certificates ieee symposium on security and privacy. pp. 232- 244 ,(1991) , 10.1109/RISP.1991.130791
Roger M. Needham, Michael D. Schroeder, Using encryption for authentication in large networks of computers Communications of the ACM. ,vol. 21, pp. 993- 999 ,(1978) , 10.1145/359657.359659
Whitfield Diffie, Martin E Hellman, None, New Directions in Cryptography IEEE Transactions on Information Theory. ,vol. 22, pp. 644- 654 ,(1976) , 10.1109/TIT.1976.1055638