Authentication Mechanisms in Microprocessor-Based Local Area Networks (Articolo in rivista)

Type
Label
  • Authentication Mechanisms in Microprocessor-Based Local Area Networks (Articolo in rivista) (literal)
Anno
  • 1989-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1109/32.24716 (literal)
Alternative label
  • L. Ciminiera; A. Valenzano (1989)
    Authentication Mechanisms in Microprocessor-Based Local Area Networks
    in IEEE transactions on software engineering; The Institute of Electrical and Electronics Engineers (IEEE), Piscataway (Stati Uniti d'America)
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • L. Ciminiera; A. Valenzano (literal)
Pagina inizio
  • 654 (literal)
Pagina fine
  • 658 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=24716 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 15 (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 5 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
  • 5 (literal)
Note
  • Google Scholar (literal)
  • ISI Web of Science (WOS) (literal)
  • Scopu (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • L. Ciminiera: Dip. di Automatica e Informatica, Politecnico di Torino, Torino, Italy A. Valenzano: Centro di Studi per l'Elaborazione Numerale dei Segnali, CENS-CNR, Torino, Italy (literal)
Titolo
  • Authentication Mechanisms in Microprocessor-Based Local Area Networks (literal)
Abstract
  • The problem of authenticating the users of a computer network in order to protect the shared resources against unauthorized use is discussed. Since intruders could enter the network and try to use services they have no right to access, the host implementing the service (or server) has to check the user's identity and access rights by searching in the relevant database. The author presents a method of carrying out such checks efficiently. The basic idea is that a suitable interface process is associated with each user-server connection in order to filter out unauthorized requests, thus implementing a sort of cache with parallel search where the working set of the whole database is stored and explored. The use of the interface process enables the system to exploit the hardware support for capability checking provided by new microprocessors. In particular, an implementation using iAPX432-based hosts is illustrated and performance issues are discussed (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Editore di
Insieme di parole chiave di
data.CNR.it