메뉴 건너뛰기




Volumn , Issue , 1991, Pages 165-182

Authentication in distributed systems: Theory and practice

Author keywords

[No Author keywords available]

Indexed keywords

DELEGATION OF AUTHORITY; DISTRIBUTED SYSTEMS; LOOKUPS; REMOTE PROCEDURE CALL; THEORY AND PRACTICE;

EID: 0039015629     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/121132.121160     Document Type: Conference Paper
Times cited : (79)

References (27)
  • 1
    • 84883268548 scopus 로고
    • Authentication and delegation with smart-cards
    • To appear in Springer, Also research report 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Oct.
    • M. Abadi, M. Burrows, C. Kaufman, and B Lampson. Authentication and delegation with smart-cards. To appear in Theoretical Aspects of Computer Sofware, Springer, 1991. Also research report 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Oct. 1990.
    • (1990) Theoretical Aspects of Computer Sofware
    • Abadi, M.1    Burrows, M.2    Kaufman, C.3    Lampson, B.4
  • 2
    • 34548730877 scopus 로고
    • A calculus for access control in distributed systems
    • To appear in Also research report 70, Systems Research Center, Digital Equipment Corp., Palo Alto, March
    • M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. To appear in Proc. Crypto '91, Springer, 1992. Also research report 70, Systems Research Center, Digital Equipment Corp., Palo Alto, March 1991.
    • (1991) Proc. Crypto '91, Springer, 1992
    • Abadi, M.1    Burrows, M.2    Lampson, B.3    Plotkin, G.4
  • 5
    • 84883268656 scopus 로고
    • Information processing systems - Open systems interconnection - The directory authentication framework
    • CCITT. Also ISO/IEC 9594-8
    • CCITT. Information processing systems - Open systems interconnection - The directory authentication framework. CCITT 1988 Recommendation X 509. Also ISO/IEC 9594-8:1989.
    • (1989) CCITT 1988 Recommendation X 509
  • 6
    • 10444273896 scopus 로고
    • Exponentiation cryptosystems on the IBM PC
    • P. Combs. Exponentiation cryptosystems on the IBM PC. IBM Systems Journal 28, 4, 1990, 526-538
    • (1990) IBM Systems Journal , vol.28 , Issue.4 , pp. 526-538
    • Combs, P.1
  • 7
    • 0025508369 scopus 로고
    • Network security via private-key certificates
    • Oct.
    • D. Davis and R. Swick. Network security via private-key certificates. ACM Operating Systems Review 24, 4, Oct. 1990, 64-67.
    • (1990) ACM Operating Systems Review , vol.24 , Issue.4 , pp. 64-67
    • Davis, D.1    Swick, R.2
  • 8
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. Denning. A lattice model of secure information flow. Comm. ACM 19, 5, May 1976, 236-243.
    • (1976) Comm. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.1
  • 10
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, New directions in cryptography. IEEE Trans. Information Theory IT-22, 6, Nov. 1976, 644-654.
    • (1976) IEEE Trans. Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 11
    • 84883264907 scopus 로고    scopus 로고
    • Systems Research Center, Digital Equipment Corp., Palo Alto. Private communication
    • H. Eberle, Systems Research Center, Digital Equipment Corp., Palo Alto. Private communication.
    • Eberle, H.1
  • 18
    • 0003508568 scopus 로고
    • National Bureau of Standards. FIPS Pub. 46, Jan.
    • National Bureau of Standards. Data Encryption Standard. FIPS Pub. 46, Jan. 1977.
    • (1977) Data Encryption Standard
  • 19
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec.
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, Dec. 1978, 993-999.
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2, Feb. 1978, 120-126.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 23
    • 84976845043 scopus 로고
    • End-to-end arguments in system design
    • Nov.
    • J. Saltzer, D. Reed, and D. Clark. End-to-end arguments in system design. ACM Trans. Computer Systems 2, 4, Nov. 1984, 277-288.
    • (1984) ACM Trans. Computer Systems , vol.2 , Issue.4 , pp. 277-288
    • Saltzer, J.1    Reed, D.2    Clark, D.3
  • 25
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Usenix Association, Berkeley, CA, Feb.
    • J. Steiner, C. Neuman, and J Schiller. Kerberos: An authentication service for open network systems. Proc. Usenix Winter Conference, Usenix Association, Berkeley, CA, Feb. 1988, 191-202.
    • (1988) Proc. Usenix Winter Conference , pp. 191-202
    • Steiner, J.1    Neuman, C.2    Schiller, J.3
  • 27
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • June
    • V. Voydock and S. Kent Security mechanisms in high-level network protocols. ACM Computing Surveys 15, 2, June 1983, 135-171.
    • (1983) ACM Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.1    Kent, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.