This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Authentication for Distributed Systems
January 1992 (vol. 25 no. 1)
pp. 39-52

A number of protocols used to authenticate users, hosts and processes are described. The three main types of authentication in a distributed computing system-message content authentication, message origin authentication, and general identity authentication-are explained. Authentication exchanges are identified, and paradigms of authentication protocols are presented. Authentication protocol failures are addressed, and an authentication framework is provided. As case studies, two authentication services, Kerberos and SPX, are examined.

Citation:
Thomas Y.C. Woo, Simon S. Lam, "Authentication for Distributed Systems," Computer, vol. 25, no. 1, pp. 39-52, Jan. 1992, doi:10.1109/2.108052
Usage of this product signifies your acceptance of the Terms of Use.