Mullender et al., 1984 - Google Patents
Protection and resource control in distributed operating systemsMullender et al., 1984
View PDF- Document ID
- 8683056846461411399
- Author
- Mullender S
- Tanenbaum A
- Publication year
- Publication venue
- Computer Networks (1976)
External Links
Snippet
Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system …
- 230000001427 coherent 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6985953B1 (en) | System and apparatus for storage and transfer of secure data on web | |
US8019881B2 (en) | Secure cookies | |
Kaijser et al. | SESAME: The solution to security for open distributed systems | |
US5689566A (en) | Network with secure communications sessions | |
CA2551113C (en) | Authentication system for networked computer applications | |
US7688975B2 (en) | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure | |
US5995624A (en) | Bilateral authentication and information encryption token system and method | |
US5638448A (en) | Network with secure communications sessions | |
US6539479B1 (en) | System and method for securely logging onto a remotely located computer | |
US7231526B2 (en) | System and method for validating a network session | |
US5717756A (en) | System and method for providing masquerade protection in a computer network using hardware and timestamp-specific single use keys | |
US6483920B2 (en) | Key recovery process used for strong encryption of messages | |
US7334255B2 (en) | System and method for controlling access to multiple public networks and for controlling access to multiple private networks | |
Mullender et al. | Protection and resource control in distributed operating systems | |
KR20040041679A (en) | IP hopping for secure data transfer | |
WO1998045975A9 (en) | Bilateral authentication and information encryption token system and method | |
Gittler et al. | The DCE security service | |
Yamaguchi et al. | Design and implementation of an authentication system in WIDE Internet environment | |
Johnson et al. | A secure distributed capability based system | |
Israel et al. | Authentication in office system internetworks | |
Iqbal et al. | Packet level access control scheme for internetwork security | |
Freisleben et al. | Capabilities and Encryption: The Ultimate Defense Against Security Attacks? | |
Heinrich et al. | A centralized approach to computer network security | |
Mullender et al. | Protection in Distributed Operating Systems | |
Varadharajan | Distributed object systems security |