IEEE Workshop on Experimental Distributed Systems
DOI: 10.1109/eds.1990.138044
|View full text |Cite
|
Sign up to set email alerts
|

Access control in a workstation-based distributed computing environment

Abstract: This paper describes the mechanisms employed to control access to system services on the IFS project. We base our distributed computing environment on systems that we trust, and run those systems in physically secure rooms. From that base, we add services, modifying them to interoperate with existing access control mechanisms. Some weaknesses remain in our environment; we conclude with a description of present vulnerabilities and future plans.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…When AFS was developed over ten years ago, a typical client workstation sported 3 MIPS and 60 MB of fairly slow disk storage and was connected to a 10 Mbps network [3]. In this environment, AFS is an excellent alternative to local disk storage: it provides crucial semantics such as a consistent local view of a global distributed filesystem; it provides good security via strong encryption for authentication, authorization, and access; it introduces the powerful concept of volume-based storage aggregation; it makes large amounts of centrally managed disk storage available to resource-poor workstations; and it doesn't run too slowly either.…”
Section: Goals and Motivationsmentioning
confidence: 99%
“…When AFS was developed over ten years ago, a typical client workstation sported 3 MIPS and 60 MB of fairly slow disk storage and was connected to a 10 Mbps network [3]. In this environment, AFS is an excellent alternative to local disk storage: it provides crucial semantics such as a consistent local view of a global distributed filesystem; it provides good security via strong encryption for authentication, authorization, and access; it introduces the powerful concept of volume-based storage aggregation; it makes large amounts of centrally managed disk storage available to resource-poor workstations; and it doesn't run too slowly either.…”
Section: Goals and Motivationsmentioning
confidence: 99%