Authentication for distributed systems

TYC Woo, SS Lam - Computer, 1992 - ieeexplore.ieee.org
TYC Woo, SS Lam
Computer, 1992ieeexplore.ieee.org
A number of protocols used to authenticate users, hosts and processes are described. The
three main types of authentication in a distributed computing system-message content
authentication, message origin authentication, and general identity authentication-are
explained. Authentication exchanges are identified, and paradigms of authentication
protocols are presented. Authentication protocol failures are addressed, and an
authentication framework is provided. As case studies, two authentication services, Kerberos …
A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failures are addressed, and an authentication framework is provided. As case studies, two authentication services, Kerberos and SPX, are examined.< >
ieeexplore.ieee.org