Access control in a distributed computer system

作者: Thomas Anthony Parker

DOI:

关键词:

摘要: A distributed computer system, has a number of users and target applications. When user logs on to the an authentication unit issues with privilege attribute certificate (PAC) representing user's access rights. wishes application, he presents PAC that application as evidence his The in turn, passes use monitor (PUM) which validates PAC. PUM is shared between plurality

参考文章(31)
John Flackett Dickson, Raymond Edward Oakley, Content addressable memories ,(1975)
Jonathan William Rowe, Geoffrey Chopping, Telecommunications transmission security arrangement ,(1989)
Rostislaw Prymak, Ramesh K. Karne, Stephen M. Matyas, Donald B. Johnson, William C. Arnold, An V. Le, John D. Wilkins, Dennis G. Abraham, Steve R. White, Secure management of keys using extended control vectors ,(1989)