A security scheme for resource sharing over a network

The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a speci...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 9; no. 1; pp. 67 - 75
Main Authors Burns, John, Mitchell, Chris J.
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier Ltd 01.02.1990
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0167-4048
1872-6208
DOI10.1016/0167-4048(90)90159-Q

Cover

Abstract The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a specified machine. The security scheme is described in detail, and an analysis of its security is also given.
AbstractList The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a specified machine. The security scheme is described in detail, and an analysis of its security is also given.
A security scheme is presented for a special purpose resource-sharing system for networked computers. This systems makes use of conventional (symmetric) cryptography, as typified by the Data Encryption Standard (DES) block cipher algorithm. It is assumed that each user and supplier in the network shares a secret key with a broker and that this secret key corresponds to an algorithm capable of being used both for data encryption and for computation of message authentication codes (MAC) for data integrity and authentication. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, that represent the right to use a certain amount of resources on a specified machine. The system may be subject to a variety of attacks by unauthorized third parties wishing to misappropriate resources. Two types of attack are replay and user attacks. The protocol could be extended to provide for multiple results messages, splitting tickets, and automatic expiry of tickets.
Author Mitchell, Chris J.
Burns, John
Author_xml – sequence: 1
  givenname: John
  surname: Burns
  fullname: Burns, John
– sequence: 2
  givenname: Chris J.
  surname: Mitchell
  fullname: Mitchell, Chris J.
BookMark eNqFkEtLAzEUhYNUsK3-AxfBlS5G85hkJi6EUnxBQQq6Dmnmjk1tJzVJK_33zlhx4UIXl7s537n3nAHqNb4BhE4puaSEyqt2iiwneXmuyIUiVKhseoD6tCxYJhkpe6j_IzlCgxgXhNBClmUfiRGOYDfBpR2Odg4rwLUPOED0m2ABx7kJrnnFfgsBG9xA-vDh7Rgd1mYZ4eR7D9HL3e3z-CGbPN0_jkeTzLJcpowxXptaFJTbCgomFCgr8lmtJJW2oEbljFioasMrSYW0QvCqnAEXpeBS5JwP0dnedx38-wZi0ov2raY9qRkpuGKd9xBd70U2-BgD1Nq6ZJLzTQrGLTUlumtJdxXorgKtiP5qSU9bOP8Fr4NbmbD7D7vZY9Cm3zoIOloHTRvGBbBJV979bfAJkKZ_Og
CODEN CPSEDU
CitedBy_id crossref_primary_10_1007_BF00197942
crossref_primary_10_1016_0743_1066_95_00095_X
crossref_primary_10_1007_BF00125075
crossref_primary_10_1016_S0140_3664_99_00030_4
crossref_primary_10_1109_49_223870
Cites_doi 10.1145/358722.358740
10.1145/359657.359659
ContentType Journal Article
Copyright 1990
Copyright Elsevier Sequoia S.A. Feb 1990
Copyright_xml – notice: 1990
– notice: Copyright Elsevier Sequoia S.A. Feb 1990
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/0167-4048(90)90159-Q
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
ProQuest Criminal Justice (Alumni)
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
EndPage 75
ExternalDocumentID 1042513
10_1016_0167_4048_90_90159_Q
016740489090159Q
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c246t-223faf5713cde7259e9c54bf9616c71a9420cedfa3d6156c553d8be3585365433
ISSN 0167-4048
IngestDate Mon Jun 30 03:37:01 EDT 2025
Thu Apr 24 22:58:13 EDT 2025
Tue Jul 01 03:48:03 EDT 2025
Fri Feb 23 02:19:48 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Computer network
Security
Cryptography
Protocol
Authentication
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c246t-223faf5713cde7259e9c54bf9616c71a9420cedfa3d6156c553d8be3585365433
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
content type line 14
PQID 207392571
PQPubID 46289
PageCount 9
ParticipantIDs proquest_journals_207392571
crossref_citationtrail_10_1016_0167_4048_90_90159_Q
crossref_primary_10_1016_0167_4048_90_90159_Q
elsevier_sciencedirect_doi_10_1016_0167_4048_90_90159_Q
ProviderPackageCode CITATION
AAYXX
PublicationCentury 1900
PublicationDate 19900201
PublicationDateYYYYMMDD 1990-02-01
PublicationDate_xml – month: 02
  year: 1990
  text: 19900201
  day: 01
PublicationDecade 1990
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 1990
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References (BIB3) August 1986
(BIB6) January 1977
(BIB9) 1988
Steiner, Neuman, Schiller (BIB11) 1988
Denning, Sacco (BIB5) 1981; 24
(BIB1) 1981
(BIB8) 1987
American Bankers Association, Washington, DC.
(BIB7) December 1980
Needham, Schroeder (BIB10) 1978; 21
(BIB2) 1983
(10.1016/0167-4048(90)90159-Q_BIB2) 1983
10.1016/0167-4048(90)90159-Q_BIB4
(10.1016/0167-4048(90)90159-Q_BIB9) 1988
(10.1016/0167-4048(90)90159-Q_BIB1) 1981
Steiner (10.1016/0167-4048(90)90159-Q_BIB11) 1988
Needham (10.1016/0167-4048(90)90159-Q_BIB10) 1978; 21
(10.1016/0167-4048(90)90159-Q_BIB3) 1986
Denning (10.1016/0167-4048(90)90159-Q_BIB5) 1981; 24
(10.1016/0167-4048(90)90159-Q_BIB8) 1987
(10.1016/0167-4048(90)90159-Q_BIB7) 1980
(10.1016/0167-4048(90)90159-Q_BIB6) 1977
References_xml – year: 1983
  ident: BIB2
  publication-title: ANSI X3.106, Data encryption algorithm–models of operation
– year: 1988
  ident: BIB9
  publication-title: ISO Draft International Standard (DIS) 9797, Data cryptographic techniques—Data integrity mechanism using a cryptographic check function employing an a n-bit algorithm with truncation
– year: August 1986
  ident: BIB3
  publication-title: ANSI X9.9, Financial institution message authentication (wholesale)
– volume: 24
  start-page: 533
  year: 1981
  end-page: 536
  ident: BIB5
  article-title: Timestamps in key distribution protocols
  publication-title: Commun. ACM
– year: 1987
  ident: BIB8
  publication-title: ISO 8372, Information processing–Models of operation for a 64-bit block cipher algorithm
– year: January 1977
  ident: BIB6
  publication-title: FIPS PUB 46, Data encryption standard
– year: 1981
  ident: BIB1
  publication-title: ANSI X3.92, Data encryption algorithm
– volume: 21
  start-page: 993
  year: 1978
  end-page: 999
  ident: BIB10
  article-title: Using encryption for authentication in large networks of computers
  publication-title: Commun. ACM
– start-page: 191
  year: 1988
  end-page: 202
  ident: BIB11
  article-title: Kerberos: An authentication service for open network systems
– year: December 1980
  ident: BIB7
  publication-title: FIPS PUB 81, DES modes of operation
– reference: , American Bankers Association, Washington, DC.
– year: 1977
  ident: 10.1016/0167-4048(90)90159-Q_BIB6
– year: 1986
  ident: 10.1016/0167-4048(90)90159-Q_BIB3
– year: 1987
  ident: 10.1016/0167-4048(90)90159-Q_BIB8
– year: 1981
  ident: 10.1016/0167-4048(90)90159-Q_BIB1
– year: 1983
  ident: 10.1016/0167-4048(90)90159-Q_BIB2
– volume: 24
  start-page: 533
  year: 1981
  ident: 10.1016/0167-4048(90)90159-Q_BIB5
  article-title: Timestamps in key distribution protocols
  publication-title: Commun. ACM
  doi: 10.1145/358722.358740
– year: 1988
  ident: 10.1016/0167-4048(90)90159-Q_BIB9
– volume: 21
  start-page: 993
  year: 1978
  ident: 10.1016/0167-4048(90)90159-Q_BIB10
  article-title: Using encryption for authentication in large networks of computers
  publication-title: Commun. ACM
  doi: 10.1145/359657.359659
– year: 1980
  ident: 10.1016/0167-4048(90)90159-Q_BIB7
– start-page: 191
  year: 1988
  ident: 10.1016/0167-4048(90)90159-Q_BIB11
  article-title: Kerberos: An authentication service for open network systems
– ident: 10.1016/0167-4048(90)90159-Q_BIB4
SSID ssj0017688
Score 1.3673174
Snippet The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of...
A security scheme is presented for a special purpose resource-sharing system for networked computers. This systems makes use of conventional (symmetric)...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 67
SubjectTerms Authentication
Codes
Computer network
Computer networks
Cryptography
Cybersecurity
Data encryption
Protocol
Resource allocation
Security
Title A security scheme for resource sharing over a network
URI https://dx.doi.org/10.1016/0167-4048(90)90159-Q
https://www.proquest.com/docview/207392571
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSx0xFA6tbtxU21q8PkoWCpUhNjOZV5YXsYhiwaLoLmQyCQp6FWfc-Os9mTxuuVatboZLuDmE-TI538l5IbSpjOaMGk1SnVNiHWdENlQTWWjKlOQVzWxy8tHvcv80PzgvzkOjbZ9d0jc76uGfeSXvQRXGAFebJfsGZKNQGIDfgC88AWF4_hfG46Tz7ecSMFL1tSvgfedv5JPuQg7RdTZKM5HJxEV8_01HQ0-HbtgBQVg00WEJ3Wy87tFlPwSPxsoEycHO9OogBbUToo2nt4m26Dl1pS7DccifoO6ONtc1wytJ1-3kyfHrbgKi2C3rxdyyCg9IEzmeqpzgZp_RRDE-MISeWUnCShKcikGKOP6I5rOqsi75-fHhn7PD6DMCw6mOldxhTkiUTMufcewHp9t-Nc8RkRmVPPCMkyX0yRsIeOzQ_ow-6MkXtBiAwv4s_oqKMQ54YQc-BvBxAB978LEFH0vswV9Gp7_2Tnb3ie-BQVSWlz0B9makKaqUqVZXYKtqroq8MbxMS1WlkucZVbo1krXATUtVFKytG83ACmQ2bZh9Q3OTm4leQbigSjGpG561JlcGeGVZqUbWdWkyU2d8hFh4IUL5AvG2T8mVeAmOESJx1q0rkPLK_6vwroUneY68CdhEr8xcC9AI_xF2IrOeZlA76eob17GGFqafxDqa6-_u9Qbwy7757jfWI-85cUk
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+security+scheme+for+resource+sharing+over+a+network&rft.jtitle=Computers+%26+security&rft.au=Burns%2C+John&rft.au=Mitchell%2C+Chris+J.&rft.date=1990-02-01&rft.issn=0167-4048&rft.volume=9&rft.issue=1&rft.spage=67&rft.epage=75&rft_id=info:doi/10.1016%2F0167-4048%2890%2990159-Q&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_0167_4048_90_90159_Q
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon