Secure communication using remote procedure calls
- 1 February 1985
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Computer Systems
- Vol. 3 (1), 1-14
- https://doi.org/10.1145/214451.214452
Abstract
Research on encryption-based secure communication protocols has reached a stage where it is feasible to construct end-to-end secure protocols. The design of such a protocol, built as part of a remote procedure call package, is described. The security abstraction presented to users of the package, the authentication mechanisms, and the protocol for encrypting and verifying remote calls are also described.Keywords
This publication has 7 references indexed in Scilit:
- Implementing remote procedure callsACM Transactions on Computer Systems, 1984
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- GrapevineCommunications of the ACM, 1982
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A cryptographic key management scheme for implementing the Data Encryption StandardIBM Systems Journal, 1978
- Generation, distribution, and installation of cryptographic keysIBM Systems Journal, 1978