Using encryption for authentication in large networks of computers
Communications of the ACM
An extensible file system for hydra
ICSE '78 Proceedings of the 3rd international conference on Software engineering
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Accent: A communication oriented network operating system kernel
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
The distributed V kernel and its performance for diskless workstations
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Concurrency: A Case Study in Remote Tasking and Distributed IPC in Mach
IEEE Parallel & Distributed Technology: Systems & Technology
Delegating responsibility in digital systems: Horton's "who done it?"
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Patterns for access control in distributed systems
Proceedings of the 14th Conference on Pattern Languages of Programs
Hi-index | 0.00 |
The Mach operating system supports secure local communication within one node of a distributed system by providing protected communication abstraction can be extended over a network by Network Server tasks. The network servers effectively act as local representatives for remote tasks by implementing an abstraction of Network Ports. To extend the security of the port-based communication abstraction into the network environment, the network servers must protect both the messages sent over the network to network ports and the access rights to network ports. This paper describes in detail the protocols used by the network servers to support security.