A security scheme for resource sharing over a network
The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a speci...
Saved in:
Published in | Computers & security Vol. 9; no. 1; pp. 67 - 75 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
Elsevier Ltd
01.02.1990
Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
ISSN | 0167-4048 1872-6208 |
DOI | 10.1016/0167-4048(90)90159-Q |
Cover
Abstract | The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a specified machine. The security scheme is described in detail, and an analysis of its security is also given. |
---|---|
AbstractList | The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a specified machine. The security scheme is described in detail, and an analysis of its security is also given. A security scheme is presented for a special purpose resource-sharing system for networked computers. This systems makes use of conventional (symmetric) cryptography, as typified by the Data Encryption Standard (DES) block cipher algorithm. It is assumed that each user and supplier in the network shares a secret key with a broker and that this secret key corresponds to an algorithm capable of being used both for data encryption and for computation of message authentication codes (MAC) for data integrity and authentication. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, that represent the right to use a certain amount of resources on a specified machine. The system may be subject to a variety of attacks by unauthorized third parties wishing to misappropriate resources. Two types of attack are replay and user attacks. The protocol could be extended to provide for multiple results messages, splitting tickets, and automatic expiry of tickets. |
Author | Mitchell, Chris J. Burns, John |
Author_xml | – sequence: 1 givenname: John surname: Burns fullname: Burns, John – sequence: 2 givenname: Chris J. surname: Mitchell fullname: Mitchell, Chris J. |
BookMark | eNqFkEtLAzEUhYNUsK3-AxfBlS5G85hkJi6EUnxBQQq6Dmnmjk1tJzVJK_33zlhx4UIXl7s537n3nAHqNb4BhE4puaSEyqt2iiwneXmuyIUiVKhseoD6tCxYJhkpe6j_IzlCgxgXhNBClmUfiRGOYDfBpR2Odg4rwLUPOED0m2ABx7kJrnnFfgsBG9xA-vDh7Rgd1mYZ4eR7D9HL3e3z-CGbPN0_jkeTzLJcpowxXptaFJTbCgomFCgr8lmtJJW2oEbljFioasMrSYW0QvCqnAEXpeBS5JwP0dnedx38-wZi0ov2raY9qRkpuGKd9xBd70U2-BgD1Nq6ZJLzTQrGLTUlumtJdxXorgKtiP5qSU9bOP8Fr4NbmbD7D7vZY9Cm3zoIOloHTRvGBbBJV979bfAJkKZ_Og |
CODEN | CPSEDU |
CitedBy_id | crossref_primary_10_1007_BF00197942 crossref_primary_10_1016_0743_1066_95_00095_X crossref_primary_10_1007_BF00125075 crossref_primary_10_1016_S0140_3664_99_00030_4 crossref_primary_10_1109_49_223870 |
Cites_doi | 10.1145/358722.358740 10.1145/359657.359659 |
ContentType | Journal Article |
Copyright | 1990 Copyright Elsevier Sequoia S.A. Feb 1990 |
Copyright_xml | – notice: 1990 – notice: Copyright Elsevier Sequoia S.A. Feb 1990 |
DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
DOI | 10.1016/0167-4048(90)90159-Q |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6208 |
EndPage | 75 |
ExternalDocumentID | 1042513 10_1016_0167_4048_90_90159_Q 016740489090159Q |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD JQ2 K7. L7M L~C L~D |
ID | FETCH-LOGICAL-c246t-223faf5713cde7259e9c54bf9616c71a9420cedfa3d6156c553d8be3585365433 |
ISSN | 0167-4048 |
IngestDate | Mon Jun 30 03:37:01 EDT 2025 Thu Apr 24 22:58:13 EDT 2025 Tue Jul 01 03:48:03 EDT 2025 Fri Feb 23 02:19:48 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Computer network Security Cryptography Protocol Authentication |
Language | English |
License | https://www.elsevier.com/tdm/userlicense/1.0 |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c246t-223faf5713cde7259e9c54bf9616c71a9420cedfa3d6156c553d8be3585365433 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 content type line 14 |
PQID | 207392571 |
PQPubID | 46289 |
PageCount | 9 |
ParticipantIDs | proquest_journals_207392571 crossref_citationtrail_10_1016_0167_4048_90_90159_Q crossref_primary_10_1016_0167_4048_90_90159_Q elsevier_sciencedirect_doi_10_1016_0167_4048_90_90159_Q |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 1900 |
PublicationDate | 19900201 |
PublicationDateYYYYMMDD | 1990-02-01 |
PublicationDate_xml | – month: 02 year: 1990 text: 19900201 day: 01 |
PublicationDecade | 1990 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Computers & security |
PublicationYear | 1990 |
Publisher | Elsevier Ltd Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
References | (BIB3) August 1986 (BIB6) January 1977 (BIB9) 1988 Steiner, Neuman, Schiller (BIB11) 1988 Denning, Sacco (BIB5) 1981; 24 (BIB1) 1981 (BIB8) 1987 American Bankers Association, Washington, DC. (BIB7) December 1980 Needham, Schroeder (BIB10) 1978; 21 (BIB2) 1983 (10.1016/0167-4048(90)90159-Q_BIB2) 1983 10.1016/0167-4048(90)90159-Q_BIB4 (10.1016/0167-4048(90)90159-Q_BIB9) 1988 (10.1016/0167-4048(90)90159-Q_BIB1) 1981 Steiner (10.1016/0167-4048(90)90159-Q_BIB11) 1988 Needham (10.1016/0167-4048(90)90159-Q_BIB10) 1978; 21 (10.1016/0167-4048(90)90159-Q_BIB3) 1986 Denning (10.1016/0167-4048(90)90159-Q_BIB5) 1981; 24 (10.1016/0167-4048(90)90159-Q_BIB8) 1987 (10.1016/0167-4048(90)90159-Q_BIB7) 1980 (10.1016/0167-4048(90)90159-Q_BIB6) 1977 |
References_xml | – year: 1983 ident: BIB2 publication-title: ANSI X3.106, Data encryption algorithm–models of operation – year: 1988 ident: BIB9 publication-title: ISO Draft International Standard (DIS) 9797, Data cryptographic techniques—Data integrity mechanism using a cryptographic check function employing an a n-bit algorithm with truncation – year: August 1986 ident: BIB3 publication-title: ANSI X9.9, Financial institution message authentication (wholesale) – volume: 24 start-page: 533 year: 1981 end-page: 536 ident: BIB5 article-title: Timestamps in key distribution protocols publication-title: Commun. ACM – year: 1987 ident: BIB8 publication-title: ISO 8372, Information processing–Models of operation for a 64-bit block cipher algorithm – year: January 1977 ident: BIB6 publication-title: FIPS PUB 46, Data encryption standard – year: 1981 ident: BIB1 publication-title: ANSI X3.92, Data encryption algorithm – volume: 21 start-page: 993 year: 1978 end-page: 999 ident: BIB10 article-title: Using encryption for authentication in large networks of computers publication-title: Commun. ACM – start-page: 191 year: 1988 end-page: 202 ident: BIB11 article-title: Kerberos: An authentication service for open network systems – year: December 1980 ident: BIB7 publication-title: FIPS PUB 81, DES modes of operation – reference: , American Bankers Association, Washington, DC. – year: 1977 ident: 10.1016/0167-4048(90)90159-Q_BIB6 – year: 1986 ident: 10.1016/0167-4048(90)90159-Q_BIB3 – year: 1987 ident: 10.1016/0167-4048(90)90159-Q_BIB8 – year: 1981 ident: 10.1016/0167-4048(90)90159-Q_BIB1 – year: 1983 ident: 10.1016/0167-4048(90)90159-Q_BIB2 – volume: 24 start-page: 533 year: 1981 ident: 10.1016/0167-4048(90)90159-Q_BIB5 article-title: Timestamps in key distribution protocols publication-title: Commun. ACM doi: 10.1145/358722.358740 – year: 1988 ident: 10.1016/0167-4048(90)90159-Q_BIB9 – volume: 21 start-page: 993 year: 1978 ident: 10.1016/0167-4048(90)90159-Q_BIB10 article-title: Using encryption for authentication in large networks of computers publication-title: Commun. ACM doi: 10.1145/359657.359659 – year: 1980 ident: 10.1016/0167-4048(90)90159-Q_BIB7 – start-page: 191 year: 1988 ident: 10.1016/0167-4048(90)90159-Q_BIB11 article-title: Kerberos: An authentication service for open network systems – ident: 10.1016/0167-4048(90)90159-Q_BIB4 |
SSID | ssj0017688 |
Score | 1.3673174 |
Snippet | The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of... A security scheme is presented for a special purpose resource-sharing system for networked computers. This systems makes use of conventional (symmetric)... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 67 |
SubjectTerms | Authentication Codes Computer network Computer networks Cryptography Cybersecurity Data encryption Protocol Resource allocation Security |
Title | A security scheme for resource sharing over a network |
URI | https://dx.doi.org/10.1016/0167-4048(90)90159-Q https://www.proquest.com/docview/207392571 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSx0xFA6tbtxU21q8PkoWCpUhNjOZV5YXsYhiwaLoLmQyCQp6FWfc-Os9mTxuuVatboZLuDmE-TI538l5IbSpjOaMGk1SnVNiHWdENlQTWWjKlOQVzWxy8tHvcv80PzgvzkOjbZ9d0jc76uGfeSXvQRXGAFebJfsGZKNQGIDfgC88AWF4_hfG46Tz7ecSMFL1tSvgfedv5JPuQg7RdTZKM5HJxEV8_01HQ0-HbtgBQVg00WEJ3Wy87tFlPwSPxsoEycHO9OogBbUToo2nt4m26Dl1pS7DccifoO6ONtc1wytJ1-3kyfHrbgKi2C3rxdyyCg9IEzmeqpzgZp_RRDE-MISeWUnCShKcikGKOP6I5rOqsi75-fHhn7PD6DMCw6mOldxhTkiUTMufcewHp9t-Nc8RkRmVPPCMkyX0yRsIeOzQ_ow-6MkXtBiAwv4s_oqKMQ54YQc-BvBxAB978LEFH0vswV9Gp7_2Tnb3ie-BQVSWlz0B9makKaqUqVZXYKtqroq8MbxMS1WlkucZVbo1krXATUtVFKytG83ACmQ2bZh9Q3OTm4leQbigSjGpG561JlcGeGVZqUbWdWkyU2d8hFh4IUL5AvG2T8mVeAmOESJx1q0rkPLK_6vwroUneY68CdhEr8xcC9AI_xF2IrOeZlA76eob17GGFqafxDqa6-_u9Qbwy7757jfWI-85cUk |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+security+scheme+for+resource+sharing+over+a+network&rft.jtitle=Computers+%26+security&rft.au=Burns%2C+John&rft.au=Mitchell%2C+Chris+J.&rft.date=1990-02-01&rft.issn=0167-4048&rft.volume=9&rft.issue=1&rft.spage=67&rft.epage=75&rft_id=info:doi/10.1016%2F0167-4048%2890%2990159-Q&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_0167_4048_90_90159_Q |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |