skip to main content
article
Free Access

Security functions for a file repository

Authors Info & Claims
Published:01 April 1997Publication History
Skip Abstract Section

Abstract

When personal machines are incorporated into distributed systems a new mixture of threats is exposed. The security effort in the MobyDick project is aimed at understanding how privacy can be protected in this new environment. Our claim is that a two-step process for authentication and authorisation is required, but also sufficient. The research vehicle is a distributed file repository.

References

  1. {1} BLAZE, M., FEIGENBAUM, J., AND LACY, J. Decentralized Trust Management. In IEEE Conference on Security and Privacy (Oakland, CA, May 1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. {2} BONEH, D., AND LIPTON, R. J. A Revocable Backup System. In 6th USENIX Security Symposium (San Jose, CA, July 1996), pp. 91-96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. {3} GONG, L. A Secure Identity-Based Capability System. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California, May 1989), pp. 56-63.Google ScholarGoogle Scholar
  4. {4} LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems 10, 4 (November 1992), 265-310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} LIEBL, A. Authentication in Distributed Systems: A Bibliography. ACM Operating Systems Review 27, 4 (October 1993), 31-41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. {6} RIVEST, R. L., AND LAMPSON, B. SDSI--A Simple Distributed Security Infrastructure. http://theory.lcs.mit.edu/~rivest/- sdsi10.ps, 1996. (Version 1.0).Google ScholarGoogle Scholar
  7. {7} TANENBAUM, A. S., VAN RENESSE, R., VAN STAVERN, H., SHARP, G. J., MULLENDER, S. J., JANSEN, J., AND VAN ROSSUM, G. Experience with the Amoeba Distributed Operating System. Communications of the ACM 33, 12 (December 1990), 46-63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. {8} ZIMMERMAN, P. PGP User's Guide, Revised for PGP Version 2.6.1, August 1994.Google ScholarGoogle Scholar

Index Terms

  1. Security functions for a file repository

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGOPS Operating Systems Review
          ACM SIGOPS Operating Systems Review  Volume 31, Issue 2
          April 1997
          95 pages
          ISSN:0163-5980
          DOI:10.1145/250007
          Issue’s Table of Contents

          Copyright © 1997 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 April 1997

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader