[go: up one dir, main page]

Mullender et al., 1984 - Google Patents

Protection and resource control in distributed operating systems

Mullender et al., 1984

View PDF
Document ID
8683056846461411399
Author
Mullender S
Tanenbaum A
Publication year
Publication venue
Computer Networks (1976)

External Links

Snippet

Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system …
Continue reading at research.vu.nl (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details

Similar Documents

Publication Publication Date Title
US6985953B1 (en) System and apparatus for storage and transfer of secure data on web
US8019881B2 (en) Secure cookies
Kaijser et al. SESAME: The solution to security for open distributed systems
US5689566A (en) Network with secure communications sessions
CA2551113C (en) Authentication system for networked computer applications
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
US5995624A (en) Bilateral authentication and information encryption token system and method
US5638448A (en) Network with secure communications sessions
US6539479B1 (en) System and method for securely logging onto a remotely located computer
US7231526B2 (en) System and method for validating a network session
US5717756A (en) System and method for providing masquerade protection in a computer network using hardware and timestamp-specific single use keys
US6483920B2 (en) Key recovery process used for strong encryption of messages
US7334255B2 (en) System and method for controlling access to multiple public networks and for controlling access to multiple private networks
Mullender et al. Protection and resource control in distributed operating systems
KR20040041679A (en) IP hopping for secure data transfer
WO1998045975A9 (en) Bilateral authentication and information encryption token system and method
Gittler et al. The DCE security service
Yamaguchi et al. Design and implementation of an authentication system in WIDE Internet environment
Johnson et al. A secure distributed capability based system
Israel et al. Authentication in office system internetworks
Iqbal et al. Packet level access control scheme for internetwork security
Freisleben et al. Capabilities and Encryption: The Ultimate Defense Against Security Attacks?
Heinrich et al. A centralized approach to computer network security
Mullender et al. Protection in Distributed Operating Systems
Varadharajan Distributed object systems security