Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/283751.283846acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free access

Identification and authentication when users have multiple accounts

Published: 03 August 1993 Publication History
First page of PDF

References

[1]
S. Carlton, J. Taylor, and J. Wyzynski, "Alternative Authentication Techniques," Proceedings, 11th National Computer Security Conference, Baltimore, MD, Oct. 1988 pp. 333-338. Discusses general characteristics of biometric technologies for use for authentication but does not consider the impact of compromise. No distinction is made between the authentication and identification functions.
[2]
D. Clark and D. Wilson, "A Comparison of Commercial and Military Security Policies," Proceedings of the 1987 Symposium on Security and Privacy, Oakland, CA, May 1987, pp.233-248. Contains much basic material on separation of duties policies.
[3]
Department of Defense, DoD Trusted Computer System Evaluation Criteria, DoD 5200.28- STD, Washington, D.C. 1985 {U.S.Government Printing Office 008-000-00461-7}. As well as defining requirements for explicit denial, the sections on control objectives and background rationale contains basic information about authentication, identification, and audit requirements for tile Department of Defense.
[4]
M.Gasser, Building a Secure Co~npulcr S.qstern, Van Nostrand Reinhold Company, New York NY.,1988. Everything that is said about the distinction between identification and authentication on pp. 20-22 is correct (if non-specific) but no practical application of the distinction is elaborated.
[5]
M. Gasser, A. Goldstein, C. Kaufmann, B.Lampson, "The Digital Distributed System Security Architecture," Proceedings, l~th National Computer Security Conference, Baltimore, MD, Oct. 1989, I)P 305-319. Description of the DSSA public-key basecl s~'cllril.y ml(l atltlle,ll.ication fl'a~nework for networked systel,lS. No specilic support for the i~lelltiiication fimction is described.
[6]
John Lin,l, "Practical Authentication for Distributed Computing," Proceedings of the 1990 IEEE Symposium on Security and Privacy, IEEE Computer Society, 1988, pp 31-39 presents a practical and scalable public-key authentication design (an instance of DSSA described in the previous paper). Such a design could be easily enhanced to support the additional identification function.
[7]
S.P. Miller, R. C. Neumann, J.I. Schiller, and J.H. Saltzer (Massachusetts Institute of Technology), Project Athena Technical Plan Section E.2.1, "Kerberos Authentication and Authorization System" describes a symmetric-key based authentication system for networks that threatens to become an ad hoe standard.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms
August 1993
198 pages
ISBN:0818654309
DOI:10.1145/283751
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 1993

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 756
    Total Downloads
  • Downloads (Last 12 months)40
  • Downloads (Last 6 weeks)9
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media