首页 | 本学科首页   官方微博 | 高级检索  
     


Authentication for distributed systems
Authors:Woo   T.Y.C. Lam   S.S.
Affiliation:Texas Univ., Austin, TX;
Abstract:A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failures are addressed, and an authentication framework is provided. As case studies, two authentication services, Kerberos and SPX, are examined
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号