OBJECT MIGRATION AND AUTHENTICATION

被引:5
作者
GLIGOR, VD
LINDSAY, BG
机构
[1] Department of Computer Science, University of Maryland
[2] IBM Research Laboratory
关键词
Authentication capabilities encryption hierarchical systems kernels networks object migration redundancy signatures type managers virtual memory; Index Terms—;
D O I
10.1109/TSE.1979.230196
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
When typed objects migrate in virtual memory, onto offine storage, or among the nodes of a network, the type managers must relinguish control over the object representation and state. In this paper we present a mechanism which allows a type manager to authenticate and reinstantiate migrated objects. This mechanism also solves some problems stemming from the hierarchical structure of the system itself. The mechanism is based on a combination of cryptographic techniques using (nondistributable) centralized, secret keys, and data redundancy which characterizes the object representation and state. Copyright © 1979 by The Institute of Electrical and Electronics Engineers, Inc.
引用
收藏
页码:607 / 611
页数:5
相关论文
共 21 条
[1]  
Lampson B.W., Sturgis H.E., Reflections on an operating system design, Commun. Ass. Comput. Mach., 19, pp. 251-265, (1976)
[2]  
England D., Capability concept, mechanism and structure in system 250, Proc. IRIA Int. Workshop on Protection in Operating Systems, pp. 63-82, (1974)
[3]  
Wulf W.A., Et al., HYDRA: The kernel of a multiprocessoroperating system, Commun. Ass. Comput. Mach., 17, pp. 337-345, (1974)
[4]  
Needham R.M., Walker R.D.H., The Cambridge CAPcomputer and its protection system, Proc. 6th Symp. Operating Systems Principles, pp. 1-10, (1977)
[5]  
Redell D.D., Naming and protection in extendible operating systems, (1974)
[6]  
Jones A.K., The object model: A conceptual tool for structuring software, Operating Systems-An Advanced Course, pp. 7-16, (1978)
[7]  
Diffie W., Hellman M., Privacy and authentication: Anintroduction to cryptography, Proc. IEEE, 67, pp. 397-427, (1979)
[8]  
Smith J., The design of Lucifer, a cryptographic device for data communications, (1971)
[9]  
Data Encryption Standard, (1977)
[10]  
Chamberlin D.D., Gray J.N., Griffiths P.P., Mresse M., Traiger I.L., Wade B.W., Et al., Data base authorization, Foundations of Secure Computation, pp. 39-56, (1978)