{"title":"级联认证","authors":"K. Sollins","doi":"10.1109/SECPRI.1988.8108","DOIUrl":null,"url":null,"abstract":"The author addresses a problem that has arisen in building distributed systems in which incomplete trust exists and program composition is necessary. The problem is to permit authentication for both access control and accounting when cascading invocations. The problem can be identified as one of providing cascaded authentication. The author has developed a mechanism she calls passports that are passed along with each stage of the cascade and digitally signed at each transition. The information thus signed is that which is critical to the authentication. The focus is both on recognizing the problem and on devising a solution that is efficient enough to be usable, although there will be some cost associated with such a mechanism.<<ETX>>","PeriodicalId":131674,"journal":{"name":"Proceedings. 1988 IEEE Symposium on Security and Privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"75","resultStr":"{\"title\":\"Cascaded authentication\",\"authors\":\"K. Sollins\",\"doi\":\"10.1109/SECPRI.1988.8108\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The author addresses a problem that has arisen in building distributed systems in which incomplete trust exists and program composition is necessary. The problem is to permit authentication for both access control and accounting when cascading invocations. The problem can be identified as one of providing cascaded authentication. The author has developed a mechanism she calls passports that are passed along with each stage of the cascade and digitally signed at each transition. The information thus signed is that which is critical to the authentication. The focus is both on recognizing the problem and on devising a solution that is efficient enough to be usable, although there will be some cost associated with such a mechanism.<<ETX>>\",\"PeriodicalId\":131674,\"journal\":{\"name\":\"Proceedings. 1988 IEEE Symposium on Security and Privacy\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"75\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. 1988 IEEE Symposium on Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECPRI.1988.8108\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1988 IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECPRI.1988.8108","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The author addresses a problem that has arisen in building distributed systems in which incomplete trust exists and program composition is necessary. The problem is to permit authentication for both access control and accounting when cascading invocations. The problem can be identified as one of providing cascaded authentication. The author has developed a mechanism she calls passports that are passed along with each stage of the cascade and digitally signed at each transition. The information thus signed is that which is critical to the authentication. The focus is both on recognizing the problem and on devising a solution that is efficient enough to be usable, although there will be some cost associated with such a mechanism.<>