Firefly: A Multiprocessor Workstation
IEEE Transactions on Computers - Special issue on architectural support for programming languages and operating systems
Performance of the Firefly RPC
ACM Transactions on Computer Systems (TOCS)
Introduction to OSF DCE (rev. 1.0)
Introduction to OSF DCE (rev. 1.0)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Authentication and delegation with smart-cards
TACS'91 Selected papers of the conference on Theoretical aspects of computer software
Cryptography and secure channels
Distributed systems (2nd Ed.)
The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
ACM SIGOPS Operating Systems Review
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Role and task-based access control in the PerDiS groupware platform
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Security requirements for cooperative work: a model and its system implications
EW 6 Proceedings of the 6th workshop on ACM SIGOPS European workshop: Matching operating systems to application needs
A General and Flexible Access-Control System for the Web
Proceedings of the 11th USENIX Security Symposium
Towards a logic for wide-area Internet routing
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
SHARP: an architecture for secure resource peering
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
PRIMA: policy-reduced integrity measurement architecture
Proceedings of the eleventh ACM symposium on Access control models and technologies
On classifying access control implementations for distributed systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
SNP: an interface for secure network programming
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
TRON: process-specific file protection for the UNIX operating system
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
The CRISIS wide area security architecture
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Alpaca: extensible authorization for distributed services
Proceedings of the 14th ACM conference on Computer and communications security
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Parameterized access control: from design to prototype
Proceedings of the 4th international conference on Security and privacy in communication netowrks
xDomain: cross-border proofs of access
Proceedings of the 14th ACM symposium on Access control models and technologies
MinimaLT: minimal-latency networking through better security
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Toward strong, usable access control for shared distributed data
FAST'14 Proceedings of the 12th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
We describe a design and implementation of security for a distributed system. In our system, applications access security services through a narrow interface. This interface provides a notion of identity that includes simple principals, groups, roles, and delegations. A new operating system component manages principals, credentials, and secure channels. It checks credentials according to the formal rules of a logic of authentication. Our implementation is efficient enough to support a substantial user community.