Title :
Authentication and authorization techniques in distributed systems
Author :
Laferriere ; Charland, Richard
Author_Institution :
Claude Laferrier Consulting, Inc., Nelpean, Ont., Canada
Abstract :
The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment
Keywords :
authorisation; computer networks; distributed processing; message authentication; smart cards; Kerberos; authentication; challenge-response systems; distributed environments; distributed systems; private key based systems; public key based systems; routing constraints; smart cards; user identity; user login; Computer network security; Data security; Distributed computing;
Conference_Titel :
Security Technology, 1993. Security Technology, Proceedings. Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on
Conference_Location :
Ottawa, Ont.
Print_ISBN :
0-7803-1479-4
DOI :
10.1109/CCST.1993.386805