Abstract
Information and communication technology is on the threshold of a new style of computing. First, the telecommunications industry is witnessing the development of Personal Communication Systems that are 'person-specific' with person to person logical connections. Second, the computer industry is in the phase of practical implementation of distributed systems concepts. In particular, the notion of open systems is a major driving force. Use of mobile personal systems in a open distributed environment raises several issues with regard to information security and system dependability. This paper addresses one key aspect of information security in such a mobile distributed environment namely that of authentication. We consider the nature of the security threat, and how it may arise in practical situations. then we describe the characteristics of the required authentication security service to counteract this threat. In particular, we outline some of the common mechanisms that can be used to provide authentication. We illustrate these issues by considering some scenarios in the areas of mobile personal information systems and client server based distributed systems, and show how the authentication mechanisms can be used to counteract the masquerading threat.
Original language | English |
---|---|
Title of host publication | IEE Conference Publication |
Place of Publication | Piscataway, NJ |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 173-188 |
Number of pages | 16 |
Edition | 387 |
ISBN (Print) | 0852966075 |
Publication status | Published - 1993 |
Externally published | Yes |
Event | Proceedings of the 7th IEE European Conference on Mobile and Personal Communications - Brighton, UK Duration: 13 Dec 1993 → 15 Dec 1993 |
Other
Other | Proceedings of the 7th IEE European Conference on Mobile and Personal Communications |
---|---|
City | Brighton, UK |
Period | 13/12/93 → 15/12/93 |