{"title":"Efficient authentication mechanisms using the iAPX-432","authors":"L Ciminiera, A Valenzano","doi":"10.1016/0252-7308(85)90027-3","DOIUrl":null,"url":null,"abstract":"<div><p>A technique for implementing authentication schemes in distributed systems, based on capability list protection mechanisms, is described in this paper.</p><p>Capabilities are generally supported by the hardware in the network nodes where client authentication is required by a server in order to perform the invoked service correctly. High efficiency can then be achieved by suitably mapping the access list check, required when services are requested by remote users, into a capability list check.</p><p>This is performed by means of “interlocutor” processes belonging to the node where the service provider resides. In this paper an implementation of the proposed scheme based on the Intel iAPX-432 microprocessor is introduced. The hardware support in the iAPX-432 can be used to enforce object protection as well as to minimize the overhead introduced in checking the client's identity.</p></div>","PeriodicalId":100687,"journal":{"name":"Interfaces in Computing","volume":"3 2","pages":"Pages 111-124"},"PeriodicalIF":0.0000,"publicationDate":"1985-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0252-7308(85)90027-3","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interfaces in Computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/0252730885900273","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A technique for implementing authentication schemes in distributed systems, based on capability list protection mechanisms, is described in this paper.
Capabilities are generally supported by the hardware in the network nodes where client authentication is required by a server in order to perform the invoked service correctly. High efficiency can then be achieved by suitably mapping the access list check, required when services are requested by remote users, into a capability list check.
This is performed by means of “interlocutor” processes belonging to the node where the service provider resides. In this paper an implementation of the proposed scheme based on the Intel iAPX-432 microprocessor is introduced. The hardware support in the iAPX-432 can be used to enforce object protection as well as to minimize the overhead introduced in checking the client's identity.