The Community for Technology Leaders
Green Image
<p>The problem of authenticating the users of a computer network in order to protect the shared resources against unauthorized use is discussed. Since intruders could enter the network and try to use services they have no right to access, the host implementing the service (or server) has to check the user's identity and access rights by searching in the relevant database. The author presents a method of carrying out such checks efficiently. The basic idea is that a suitable interface process is associated with each user-server connection in order to filter out unauthorized requests, thus implementing a sort of cache with parallel search where the working set of the whole database is stored and explored. The use of the interface process enables the system to exploit the hardware support for capability checking provided by new microprocessors. In particular, an implementation using iAPX432-based hosts is illustrated and performance issues are discussed.</p>
authentication mechanisms; microprocessor-based local area networks; protect; shared resources; unauthorized use; intruders; service; server; check; identity; access rights; searching; database; interface process; user-server connection; unauthorized requests; cache; parallel search; hardware support; capability checking; iAPX432-based hosts; performance issues; local area networks; security of data
A. Valenzano, L. Ciminiera, "Authentication Mechanisms in Microprocessor-Based Local Area Networks", IEEE Transactions on Software Engineering, vol. 15, no. , pp. 654-658, May 1989, doi:10.1109/32.24716
128 ms
(Ver 3.3 (11022016))