Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Authentication in the Taos Operating System EDWARD WOBBER, MART ' IN ABADI, MICHAEL BURROWS,
 

Summary: Authentication in the Taos Operating System
EDWARD WOBBER, MART ' IN ABADI, MICHAEL BURROWS,
and BUTLER LAMPSON
Digital Equipment Corporation
We describe a design for security in a distributed system and its implementation. In our design,
applications gain access to security services through a narrow interface. This interface provides a
notion of identity that includes simple principals, groups, roles, and delegations. A new operating
system component manages principals, credentials, and secure channels. It checks credentials
according to the formal rules of a logic of authentication. Our implementation is efficient enough
to support a substantial user community.
Categories and Subject Descriptors: C.2.4 [Computer­Communication Networks]: Distribut­
ed Systems; D.4.6 [Operating Systems]: Security and Protection---access control; authentica­
tion
General Terms: Security, Theory
Additional Key Words and Phrases: cryptography, mathematical logic
1. INTRODUCTION
We describe a design for security in a distributed system and a particular imple­
mentation of this design. We present both the external interface and the major
internal interfaces of our implementation. A formal logic [2, 9] guided our design.
We explain the correspondence between implementation and logic, in particular

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences