Proxy-based authorization and accounting for distributed systems:
Abstract: "In recent years there has been much interest in the secure authentication of principals across computer networks. There has been less discussion of distributed mechanisms to support authorization and accounting. Authorization and accounting are more closely related to authentication...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Seattle, Wash.
1991
|
Schriftenreihe: | University of Washington <Seattle, Wash.> / Department of Computer Science: Technical report
91,2,1 |
Schlagworte: | |
Zusammenfassung: | Abstract: "In recent years there has been much interest in the secure authentication of principals across computer networks. There has been less discussion of distributed mechanisms to support authorization and accounting. Authorization and accounting are more closely related to authentication than most people realize. By generalizing the authentication model to support restricted proxies, both authorization and accounting can be easily supported. This paper shows how to support restricted proxies in an authentication system, presents an appropriate model for authorization and accounting, and describes how they may be easily implemented on top of restricted proxies." |
Beschreibung: | 14 S. |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV008992804 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 940206s1991 |||| 00||| eng d | ||
035 | |a (OCoLC)28390688 | ||
035 | |a (DE-599)BVBBV008992804 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Neumann, B. C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Proxy-based authorization and accounting for distributed systems |c B. Clifford Neumann |
264 | 1 | |a Seattle, Wash. |c 1991 | |
300 | |a 14 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a University of Washington <Seattle, Wash.> / Department of Computer Science: Technical report |v 91,2,1 | |
520 | 3 | |a Abstract: "In recent years there has been much interest in the secure authentication of principals across computer networks. There has been less discussion of distributed mechanisms to support authorization and accounting. Authorization and accounting are more closely related to authentication than most people realize. By generalizing the authentication model to support restricted proxies, both authorization and accounting can be easily supported. This paper shows how to support restricted proxies in an authentication system, presents an appropriate model for authorization and accounting, and describes how they may be easily implemented on top of restricted proxies." | |
650 | 4 | |a Distributed parameter systems | |
810 | 2 | |a Department of Computer Science: Technical report |t University of Washington <Seattle, Wash.> |v 91,2,1 |w (DE-604)BV008930431 |9 91,2,1 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-005941722 |
Datensatz im Suchindex
_version_ | 1804123335324336128 |
---|---|
any_adam_object | |
author | Neumann, B. C. |
author_facet | Neumann, B. C. |
author_role | aut |
author_sort | Neumann, B. C. |
author_variant | b c n bc bcn |
building | Verbundindex |
bvnumber | BV008992804 |
ctrlnum | (OCoLC)28390688 (DE-599)BVBBV008992804 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01667nam a2200289 cb4500</leader><controlfield tag="001">BV008992804</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">940206s1991 |||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)28390688</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV008992804</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Neumann, B. C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proxy-based authorization and accounting for distributed systems</subfield><subfield code="c">B. Clifford Neumann</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Seattle, Wash.</subfield><subfield code="c">1991</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">14 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">University of Washington <Seattle, Wash.> / Department of Computer Science: Technical report</subfield><subfield code="v">91,2,1</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Abstract: "In recent years there has been much interest in the secure authentication of principals across computer networks. There has been less discussion of distributed mechanisms to support authorization and accounting. Authorization and accounting are more closely related to authentication than most people realize. By generalizing the authentication model to support restricted proxies, both authorization and accounting can be easily supported. This paper shows how to support restricted proxies in an authentication system, presents an appropriate model for authorization and accounting, and describes how they may be easily implemented on top of restricted proxies."</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Distributed parameter systems</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Department of Computer Science: Technical report</subfield><subfield code="t">University of Washington <Seattle, Wash.></subfield><subfield code="v">91,2,1</subfield><subfield code="w">(DE-604)BV008930431</subfield><subfield code="9">91,2,1</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-005941722</subfield></datafield></record></collection> |
id | DE-604.BV008992804 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T17:28:08Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-005941722 |
oclc_num | 28390688 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | 14 S. |
publishDate | 1991 |
publishDateSearch | 1991 |
publishDateSort | 1991 |
record_format | marc |
series2 | University of Washington <Seattle, Wash.> / Department of Computer Science: Technical report |
spelling | Neumann, B. C. Verfasser aut Proxy-based authorization and accounting for distributed systems B. Clifford Neumann Seattle, Wash. 1991 14 S. txt rdacontent n rdamedia nc rdacarrier University of Washington <Seattle, Wash.> / Department of Computer Science: Technical report 91,2,1 Abstract: "In recent years there has been much interest in the secure authentication of principals across computer networks. There has been less discussion of distributed mechanisms to support authorization and accounting. Authorization and accounting are more closely related to authentication than most people realize. By generalizing the authentication model to support restricted proxies, both authorization and accounting can be easily supported. This paper shows how to support restricted proxies in an authentication system, presents an appropriate model for authorization and accounting, and describes how they may be easily implemented on top of restricted proxies." Distributed parameter systems Department of Computer Science: Technical report University of Washington <Seattle, Wash.> 91,2,1 (DE-604)BV008930431 91,2,1 |
spellingShingle | Neumann, B. C. Proxy-based authorization and accounting for distributed systems Distributed parameter systems |
title | Proxy-based authorization and accounting for distributed systems |
title_auth | Proxy-based authorization and accounting for distributed systems |
title_exact_search | Proxy-based authorization and accounting for distributed systems |
title_full | Proxy-based authorization and accounting for distributed systems B. Clifford Neumann |
title_fullStr | Proxy-based authorization and accounting for distributed systems B. Clifford Neumann |
title_full_unstemmed | Proxy-based authorization and accounting for distributed systems B. Clifford Neumann |
title_short | Proxy-based authorization and accounting for distributed systems |
title_sort | proxy based authorization and accounting for distributed systems |
topic | Distributed parameter systems |
topic_facet | Distributed parameter systems |
volume_link | (DE-604)BV008930431 |
work_keys_str_mv | AT neumannbc proxybasedauthorizationandaccountingfordistributedsystems |