Authentication and discretionary access control in computer networks
Computers and Security
ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Authentication in office system internetworks
ACM Transactions on Information Systems (TOIS)
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Interprocess communication protocols for computer networks.
Interprocess communication protocols for computer networks.
ID-Based access control and authority delegations
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Towards more controllable and practical delegation
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Securing information gateways with derivation-constrained access control
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Secure end-to-end delegations in distributed systems
Computer Communications
Hi-index | 0.00 |
This paper addresses a problem that has arisen in building distributed systems in which incomplete tmst exists and program composition is necessary. The problem is to permit authentication for both access control and accounting when cascading invocations. The problem can be identified as one of providing cascaded authentication. We have developed a mechanism we call passports that are passed along with each stage of the cascade and digitally signed at each transition. The information thus signed is that which is critical to the authentication. The contributions of the work are both in recognizing the problem and in devising a solution that is efficient enough to be usable, although there will be some cost associated with such a mechanism.