Abstract
We describe a design for security in a distributed system and its implementation. In our design, applications gain access to security services through a narrow interface. This interface provides a notion of identity that includes simple principals, groups, roles, and delegations. A new operating system component manages principals, credentials, and secure channels. It checks credentials according to the formal rules of a logic of authentication. Our implementation is efficient enough to support a substantial user community. © 1994, ACM. All rights reserved.
Author supplied keywords
Cite
CITATION STYLE
Wobber, E., Abadi, M., Burrows, M., & Lampson, B. (1994). Authentication in the Taos Operating System. ACM Transactions on Computer Systems (TOCS), 12(1), 3–32. https://doi.org/10.1145/174613.174614
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.