A Security Architecture for Tenet Scheme 2
Title | A Security Architecture for Tenet Scheme 2 |
Publication Type | Technical Report |
Year of Publication | 1995 |
Authors | Oppliger, R., Gupta A., Moran M., & Bettati R. |
Other Numbers | 991 |
Abstract | This report proposes a security architecture for Tenet Scheme 2. The basic ideas are (1) to use Internet layer security protocols, such as the IP Security Protocol (IPSP) and Internet Key Management Protocol (IKMP), to establish authentic communication channels between RCAP daemons, (2) to handle client authentication and authorization locally, and (3) to use a proxy-based mechanism to propagate access rights. The security architecture uses as its building blocks a collision-resistant one-way hash function to compute and verify message authentication codes, and a digital signature system. |
URL | http://www.icsi.berkeley.edu/ftp/global/pub/techreports/1995/tr-95-051.pdf |
Bibliographic Notes | ICSI Technical Report TR-95-051 |
Abbreviated Authors | R. Oppliger, A. Gupta, M. Moran, and R. Bettati |
ICSI Publication Type | Technical Report |