Efficient Authentication Mechanisms Using the iAPX-432 (Articolo in rivista)

Type
Label
  • Efficient Authentication Mechanisms Using the iAPX-432 (Articolo in rivista) (literal)
Anno
  • 1985-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1016/0252-7308(85)90027-3 (literal)
Alternative label
  • L. Ciminiera; A. Valenzano (1985)
    Efficient Authentication Mechanisms Using the iAPX-432
    in Interfaces in computing; ELSEVIER SCIENCE SA, PO BOX 564, 1001 LAUSANNE (Svizzera)
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • L. Ciminiera; A. Valenzano (literal)
Pagina inizio
  • 111 (literal)
Pagina fine
  • 124 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://www.sciencedirect.com/science/article/pii/0252730885900273 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 3 (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 14 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
  • 2 (literal)
Note
  • ISI Web of Science (WOS) (literal)
  • Scopu (literal)
  • Google Scholar (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • L. Ciminiera: Dip. di Automatica e Informatica, Politecnico di Torino, Torino, Italy A. Valenzano: Centro di Studi per l'Elaborazione Numerale dei Segnali, CENS-CNR, Torino, Italy (literal)
Titolo
  • Efficient Authentication Mechanisms Using the iAPX-432 (literal)
Abstract
  • A technique for implementing authentication schemes in distributed systems, based on capability list protection mechanisms, is described in this paper. Capabilities are generally supported by the hardware in the network nodes where client authentication is required by a server in order to perform the invoked service correctly. High efficiency can then be achieved by suitably mapping the access list check, required when services are requested by remote users, into a capability list check. This is performed by means of \"interlocutor\" processes belonging to the node where the service provider resides. In this paper an implementation of the proposed scheme based on the Intel iAPX-432 microprocessor is introduced. The hardware support in the iAPX-432 can be used to enforce object protection as well as to minimize the overhead introduced in checking the client's identity. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Editore di
Insieme di parole chiave di
data.CNR.it