skip to main content
article
Free Access

Problems with DCE security services

Authors Info & Claims
Published:01 October 1995Publication History
Skip Abstract Section

Abstract

Distributed computing is receiving an ever increasing amount of interest and with it come many challenges, not the least of which is how to maintain system and network security. Issues relating to user authentication, access authorization, and communication security must be addressed when multiple, heterogeneous systems are connected. While these issues have been addressed in OSFs DCE, several problems remain. This paper describes some of these problems.

References

  1. {1} Open Software Foundation, Introduction to OSF DCE, Prentice Hall, Englewood Cliffs, NJ, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. {2} Open Software Foundation, OSF DCE Application Development Guide, Prentice Hall, Englewood Cliffs, NJ, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. {3} Kohl, John, and Clifford Neuman, "The Kerberos Network Authentication Service (V5)", Internet Draft, 1 September 1992.Google ScholarGoogle Scholar
  4. {4} Lockhart, Harold W. Jr., OSF DCE Guide to Developing Distributed Applications, McGraw-Hill, Inc., New York, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} Carter, Mark, "Adding 50, 200 Users to a DCE Registry: A Comparison of OSF DCE V1.0.2 and IBM DCE/6000 V1.2", Center for Information Technology Integration, University of Michigan, Ann Arbor, MI, February 1994.Google ScholarGoogle Scholar
  6. {6} Lever, Charles, "Using DFS Without DCE/LFS", Center for Information Technology, Integration, University of Michigan, Ann Arbor, MI, January 1994.Google ScholarGoogle Scholar
  7. {7} Kohl, John, "The Kerberos Network Authentication Service (V5)", Internet-Draft, September 1992.Google ScholarGoogle Scholar
  8. {8} Steiner, Jennifer, Clifford Neuman, and Jeffrey Schiller, "Kerberos: An Authentication Service for Open Network Systems", March 1988.Google ScholarGoogle Scholar
  9. {9} Bellovin, S.M., M. Merritt, "Limitations of the Kerberos Protocol", AT&T Bell Laboratories, NJ.Google ScholarGoogle Scholar
  10. {10} Kohl, John, Clifford Neumann, and Theodore Ts'o, "The Evolution of the Kerberos Authentication Service", EurOpen Conference, Spring 1991.Google ScholarGoogle Scholar
  11. {11} Mannix, Frank, "OSF DCE: Introduction to Open Software Foundation's Distributed Computing Environment", Digital Services, September 1992.Google ScholarGoogle Scholar
  12. {12} Tanenbaum, Andrew S. Distributed Operating Systems. Prentice Hall, Englewood Cliffs, N.J., 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Problems with DCE security services

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGCOMM Computer Communication Review
            ACM SIGCOMM Computer Communication Review  Volume 25, Issue 5
            Oct. 1995
            101 pages
            ISSN:0146-4833
            DOI:10.1145/216701
            Issue’s Table of Contents

            Copyright © 1995 Authors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 October 1995

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader