{"title":"分布式系统中的身份识别和认证","authors":"M. Hurton","doi":"10.1109/EURCON.2001.938146","DOIUrl":null,"url":null,"abstract":"The article deals with the problem of agent identification and authentication in distributed systems. It claims that solutions known and employed today violate the principle of limited knowledge and limited control; and therefore impose undue limits to system evolution. To propose a solution, the article first examines the concept of object, agent, model and model space. These are later used to explore and justify the phenomena of agent identification and authentication.","PeriodicalId":205662,"journal":{"name":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Identification and authentication in distributed systems\",\"authors\":\"M. Hurton\",\"doi\":\"10.1109/EURCON.2001.938146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article deals with the problem of agent identification and authentication in distributed systems. It claims that solutions known and employed today violate the principle of limited knowledge and limited control; and therefore impose undue limits to system evolution. To propose a solution, the article first examines the concept of object, agent, model and model space. These are later used to explore and justify the phenomena of agent identification and authentication.\",\"PeriodicalId\":205662,\"journal\":{\"name\":\"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2001-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EURCON.2001.938146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EURCON.2001.938146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identification and authentication in distributed systems
The article deals with the problem of agent identification and authentication in distributed systems. It claims that solutions known and employed today violate the principle of limited knowledge and limited control; and therefore impose undue limits to system evolution. To propose a solution, the article first examines the concept of object, agent, model and model space. These are later used to explore and justify the phenomena of agent identification and authentication.