Authentication for distributed systems

A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are...

Full description

Saved in:
Bibliographic Details
Published inComputer (Long Beach, Calif.) Vol. 25; no. 1; pp. 39 - 52
Main Authors Woo, T.Y.C., Lam, S.S.
Format Journal Article
LanguageEnglish
Published IEEE 01.01.1992
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failures are addressed, and an authentication framework is provided. As case studies, two authentication services, Kerberos and SPX, are examined.< >
ISSN:0018-9162
1558-0814
DOI:10.1109/2.108052