Authentification for Distributed Systems

A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failures are addressed, and an authentication framework is provided. As case studies, two authentication services, Kerberos and SPX, are examined. >

[1]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  A. Udaya Shankar,et al.  Applying a theory of modules and interfaces to security verification , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[5]  Gustavus J. Simmons,et al.  Symmetric and Asymmetric Encryption , 1979, CSUR.

[6]  K. S. Shankar,et al.  Special Feature The Total Computer Security Problem: an Oveview , 1977, Computer.

[7]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[8]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[9]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[10]  J.J. Tardo,et al.  SPX: global authentication using public key certificates , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[12]  Morrie Gasser,et al.  An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[13]  J. Linn Practical authentication for distributed computing , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  Thomas Y. C. Woo,et al.  Authentication for distributed systems , 1997, Computer.

[15]  Martín Abadi,et al.  Authentication and Delegation with Smart-cards , 1991, TACS.

[16]  Morrie Gasser,et al.  The Digital Distributed System Security Architecture , 1989 .

[17]  Steven M. Bellovin,et al.  Limitations of the Kerberos authentication system , 1990, CCRV.