The Community for Technology Leaders
14th International Conference on Distributed Computing Systems (1994)
Pozman, Poland
June 21, 1994 to June 24, 1994
ISBN: 0-8186-5840-1
pp: 106-115
S. Radia , Sun Microsyst. Comput. Corp., Mountain View, CA, USA
M.N. Nelson , Sun Microsyst. Comput. Corp., Mountain View, CA, USA
M.L. Powell , Sun Microsyst. Comput. Corp., Mountain View, CA, USA
ABSTRACT
Spring provides a uniform name service for an open ended collection of object types-in principle, any object, of any type, can be bound to any name. The name service implements authentication and access control to protect itself, and provides these same functions in an integrated way for the convenience of clients and the object managers that implement the various objects in the system. An object manager can delegate these functions to the name service, or implement its own policies. The name service is implemented as a collection of name servers which are generally autonomous and separate from each other and also from object managers. The architecture allows trusted and untrusted name servers and object managers to participate in providing naming and in publishing objects. Authentication is done at appropriate times to establish trust. These trust relationships are encoded in capability-like authenticated objects which are reused to avoid authentication complexity and overhead after trust is established.<>
INDEX TERMS
security of data, object-oriented methods, operating systems (computers)
CITATION

S. Radia, M. Nelson and M. Powell, "Security in the Spring name service," 14th International Conference on Distributed Computing Systems(ICDCS), Pozman, Poland, 1994, pp. 106-115.
doi:10.1109/ICDCS.1994.302400
83 ms
(Ver 3.3 (11022016))