{"title":"分布式系统中的身份验证和授权技术","authors":"C. Laferriere, R. Charland","doi":"10.1109/CCST.1993.386805","DOIUrl":null,"url":null,"abstract":"The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"57 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Authentication and authorization techniques in distributed systems\",\"authors\":\"C. Laferriere, R. Charland\",\"doi\":\"10.1109/CCST.1993.386805\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment.<<ETX>>\",\"PeriodicalId\":404786,\"journal\":{\"name\":\"1993 Proceedings of IEEE International Carnahan Conference on Security Technology\",\"volume\":\"57 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1993-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1993 Proceedings of IEEE International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1993.386805\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1993.386805","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication and authorization techniques in distributed systems
The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment.<>