A Security Architecture for Tenet Scheme 2

TitleA Security Architecture for Tenet Scheme 2
Publication TypeTechnical Report
Year of Publication1995
AuthorsOppliger, R., Gupta A., Moran M., & Bettati R.
Other Numbers991
Abstract

This report proposes a security architecture for Tenet Scheme 2. The basic ideas are (1) to use Internet layer security protocols, such as the IP Security Protocol (IPSP) and Internet Key Management Protocol (IKMP), to establish authentic communication channels between RCAP daemons, (2) to handle client authentication and authorization locally, and (3) to use a proxy-based mechanism to propagate access rights. The security architecture uses as its building blocks a collision-resistant one-way hash function to compute and verify message authentication codes, and a digital signature system.

URLhttp://www.icsi.berkeley.edu/ftp/global/pub/techreports/1995/tr-95-051.pdf
Bibliographic Notes

ICSI Technical Report TR-95-051

Abbreviated Authors

R. Oppliger, A. Gupta, M. Moran, and R. Bettati

ICSI Publication Type

Technical Report