Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Yaksha: augmenting Kerberos with public key cryptography
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Working Group Report on Application Security
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Hi-index | 0.00 |
As applications become more distributed, the design and management of security services play an increasingly significant role. Furthermore the need to integrate security management with network and system management to provide a uniform view to the system manager is becoming critical in an enterprise. The paper describes the design and the provision of services for securing the management of enterprise wide networked systems. It presents the architectural principles involved, the design of security services, and the trusted components and the protocols that provide these services. The design is illustrated using a distributed management application example.