DocumentCode :
2563938
Title :
Authentication and authorization techniques in distributed systems
Author :
Laferriere ; Charland, Richard
Author_Institution :
Claude Laferrier Consulting, Inc., Nelpean, Ont., Canada
fYear :
1993
fDate :
13-15 Oct 1993
Firstpage :
164
Lastpage :
170
Abstract :
The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment
Keywords :
authorisation; computer networks; distributed processing; message authentication; smart cards; Kerberos; authentication; challenge-response systems; distributed environments; distributed systems; private key based systems; public key based systems; routing constraints; smart cards; user identity; user login; Computer network security; Data security; Distributed computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1993. Security Technology, Proceedings. Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on
Conference_Location :
Ottawa, Ont.
Print_ISBN :
0-7803-1479-4
Type :
conf
DOI :
10.1109/CCST.1993.386805
Filename :
386805
Link To Document :
بازگشت