{"title":"工业技术研究院分布式信息系统的安全机制","authors":"K. Farn, Y.-T. Ku, S. Tseng, M.-T. Hsien","doi":"10.1109/CCST.1992.253742","DOIUrl":null,"url":null,"abstract":"A security mechanism based upon a public key cryptosystem and signature scheme, used in the ITRI distributed information system is proposed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and sensitive information integrity guarantees. An access control scheme for a distributed information system which adopts a cryptographic concept is discussed. Some techniques are presented to be used for access control mechanisms capable of capturing, enforcing, and protecting the relevant access control semantics at each network site.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"222 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security mechanisms for distributed information system in Industrial Technology Research Institute (ITRI)\",\"authors\":\"K. Farn, Y.-T. Ku, S. Tseng, M.-T. Hsien\",\"doi\":\"10.1109/CCST.1992.253742\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A security mechanism based upon a public key cryptosystem and signature scheme, used in the ITRI distributed information system is proposed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and sensitive information integrity guarantees. An access control scheme for a distributed information system which adopts a cryptographic concept is discussed. Some techniques are presented to be used for access control mechanisms capable of capturing, enforcing, and protecting the relevant access control semantics at each network site.<<ETX>>\",\"PeriodicalId\":105477,\"journal\":{\"name\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"volume\":\"222 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1992.253742\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security mechanisms for distributed information system in Industrial Technology Research Institute (ITRI)
A security mechanism based upon a public key cryptosystem and signature scheme, used in the ITRI distributed information system is proposed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and sensitive information integrity guarantees. An access control scheme for a distributed information system which adopts a cryptographic concept is discussed. Some techniques are presented to be used for access control mechanisms capable of capturing, enforcing, and protecting the relevant access control semantics at each network site.<>