skip to main content
article
Free Access

Authentication in distributed systems: theory and practice

Authors Info & Claims
Published:01 September 1991Publication History
Skip Abstract Section

Abstract

We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a "speaks for" relation between principals. A simple principal either has a name or is a communication channel; a compound principal can express an adopted role or delegation of authority. The theory explains how to reason about a principal's authority by deducing the other principals that it can speak for; authenticating a channel is one important application. We use the theory to explain many existing and proposed mechanisms for security. In particular, we describe the system we have built. It passes principals efficiently as arguments or results of remote procedure calls, and it handles public and shared key encryption, name lookup in a large name space, groups of principals, loading programs, delegation, access control, and revocation.

References

  1. 1 M. Abad~, M. Burrows, C. Kaufman, and B Lampson. Authentication and delegation with smart-cards. To appear m Theoretical Aspects of Computer Software, Springer, 199 I. Also research report 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Oct. 1990.Google ScholarGoogle Scholar
  2. 2 M. Abadi, M. Burrows, B. Lampson, and G. Plotlon. A calculus for access control in distributed systems. To appear in Proc. Crypto '91, Springer, 1992. Also research report 70, Systems Research Center, Digital Equipment Corp., Palo Alto, March 199 I. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 A. Birrell, B. Lampson. R. Needham, and M. Schroeder. Global auth~gticanon without global trust. Proc. IEEE Symposium on Securi0, and Privacy, Oakland, 1986, 223-230.Google ScholarGoogle Scholar
  4. 4 M Burrows, M. Abadi, and R. Needham. A logic of authentication ACM Trans. Computer Systems 8, I, Feb. 1990, 18-36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 CCITT. Information processing systems -- Open systems interconnection --The directory authentication framework. CCITT I988 Recommendation X 509. Also ISO/IEC 9594-8:1989.Google ScholarGoogle Scholar
  6. 6 P. Comba. Exponentiatmn cryptosystems on the IBM PC. IBM Systems Journal 28, 4, 1990, 526-538 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 D. Davis and R. Swtck. Network security via private-key certificates. ACM Operating Systems Review 24, 4, Oct. 1990, 64-67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 D. Denning. A lattice model of secure information flow. Comm. A CM 19, 5, May 1976, 236-243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Department of Defense. Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, 1985.Google ScholarGoogle Scholar
  10. 10 W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Information Theory IT-22, 6, Nov. 1976, 644-654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 H. Eberle, Systems Research Center, D~g~tal Equipment Corp., Palo Alto. Private communication.Google ScholarGoogle Scholar
  12. 12 M. Gasser, A. Goldsteln, C. Kaufman, and B. Lampson. The Digital distributed system security architecture. Proc. 12th National Computer Security Conference, NIST/NCSC, Baltimore, 1989, 305- 319.Google ScholarGoogle Scholar
  13. 13 M. Gasser and E. McDermott. An architecture for practical delegation in a distributed system. Proc. IEEE Symposium on Security and Privacy, Oakland, 1990, 20-30.Google ScholarGoogle ScholarCross RefCross Ref
  14. 14 B. Herbison. Low cost outboard cryptographic support for SILS and SP4. Proc. I3th National Computer Security Conference, NIST/NCSC, Baltimore, 1990, 286-295.Google ScholarGoogle Scholar
  15. 15 J. Kohl, C. Neuman, and J. Steiner. The Kerberos network authenticatmn service. Version 5, draft 3, Project Athena, MfT, Oct. 1990.Google ScholarGoogle Scholar
  16. 16 B. Lampson. Protection. A CM Operating Systems Review 8, 1, Jan. 1974, 18-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17 J. Linn. Practical authentication for distributed systems. Proc. IEEE Symposium on Securlty and Privacy, Oakland, 1990, 31-40.Google ScholarGoogle Scholar
  18. 18 National Bureau of Standards. Data Encryption Standard. FIPS Pub. 46, Jan. I977.Google ScholarGoogle Scholar
  19. 19 R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, Dec. 1978, 993- 999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20 C. Neuman. Proxy-based authorizauon and accounting for distributed systems. Technical report 91-02-01, Umversity of Washington, Seattle, March 1991.Google ScholarGoogle Scholar
  21. 21 R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2, Feb. 1978, 120-126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22 R. Rivest. The MD4 message digest algorithm TM 434, Laboratory for Computer Science, MIT, Oct. 1990.Google ScholarGoogle Scholar
  23. 23 J. Saltzer, D. Reed, and D. Clark. End-to-end arguments in system design. ACM Trans. Computer Systems 2, 4, Nov. 1984, 277-288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24 M. Shand, P. Bertin, and J. Vmllemin. Resource tradeoffs in fast long integer multiplication. 2rid A CM Symposium on Parallel Algorithms and Architectures, Crete, July 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25 J. Steiner, C. Neuman, and J Schiller. Kerberos: An authentication service for open network systems. Proc. Usenix Winter Conference, Usenix Associanon, Berkeley, CA, Feb. 1988, 19t-202.Google ScholarGoogle Scholar
  26. 26 J. Tardo and K. Alagappan. SPX. Global authentication using public key certificates. Proc. t4th National Computer Security Conference, NIST/NCSC, Baltimore, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  27. 27 V. Voydock and S. Kent Security mechanisms in high-level network protocols. ACM Computing Surveya 15, 2, June I983, 135- t71. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Authentication in distributed systems: theory and practice

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM SIGOPS Operating Systems Review
              ACM SIGOPS Operating Systems Review  Volume 25, Issue 5
              Oct. 1991
              253 pages
              ISSN:0163-5980
              DOI:10.1145/121133
              Issue’s Table of Contents
              • cover image ACM Conferences
                SOSP '91: Proceedings of the thirteenth ACM symposium on Operating systems principles
                September 1991
                253 pages
                ISBN:0897914473
                DOI:10.1145/121132

              Copyright © 1991 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 September 1991

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader