Authentication in the Taos Operating System

120Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

We describe a design for security in a distributed system and its implementation. In our design, applications gain access to security services through a narrow interface. This interface provides a notion of identity that includes simple principals, groups, roles, and delegations. A new operating system component manages principals, credentials, and secure channels. It checks credentials according to the formal rules of a logic of authentication. Our implementation is efficient enough to support a substantial user community. © 1994, ACM. All rights reserved.

Author supplied keywords

Cite

CITATION STYLE

APA

Wobber, E., Abadi, M., Burrows, M., & Lampson, B. (1994). Authentication in the Taos Operating System. ACM Transactions on Computer Systems (TOCS), 12(1), 3–32. https://doi.org/10.1145/174613.174614

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free