{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T17:07:57Z","timestamp":1774112877194,"version":"3.50.1"},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[1992,11,1]],"date-time":"1992-11-01T00:00:00Z","timestamp":720576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[1992,11]]},"abstract":"<jats:p>We describe a theory of authentication and a system that implements it. Our theory is based on the notion of principal and a \u201cspeaks for\u201d relation between principals. A simple principal either has a name or is a communication channel; a compound principal can express an adopted role or delegated authority. The theory shows how to reason about a principal's authority by deducing the other principals that it can speak for; authenticating a channel is one important application. We use the theory to explain many existing and proposed security mechanisms. In particular, we describe the system we have built. It passes principals efficiently as arguments or results of remote procedure calls, and it handles public and shared key encryption, name lookup in a large name space, groups of principals, program loading, delegation, access control, and revocation.<\/jats:p>","DOI":"10.1145\/138873.138874","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T11:28:46Z","timestamp":1027769326000},"page":"265-310","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":414,"title":["Authentication in distributed systems"],"prefix":"10.1145","volume":"10","author":[{"given":"Butler","family":"Lampson","sequence":"first","affiliation":[{"name":"Digital Equipment Corp., Palo Alto, CA"}]},{"given":"Mart\u00edn","family":"Abadi","sequence":"additional","affiliation":[{"name":"Digital Equipment Corp., Palo Alto, CA"}]},{"given":"Michael","family":"Burrows","sequence":"additional","affiliation":[{"name":"Digital Equipment Corp., Palo Alto, CA"}]},{"given":"Edward","family":"Wobber","sequence":"additional","affiliation":[{"name":"Digital Equipment Corp., Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[1992,11]]},"reference":[{"key":"e_1_2_1_1_2","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/3-540-54415-1_53","volume-title":"Theoretical Aspects of Computer Software, LNCS 526","author":"ABADI M.","year":"1991","unstructured":"ABADI , M. , BURROWS , M. , KAUFMAN , C. , AND LAMPSON , B. Authentication and delegation with smart-cards . In Theoretical Aspects of Computer Software, LNCS 526 , Springer , 1991 , pp. 326 - 345 . Also Res. Rep. 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., Oct. 1990. To appear in Science of Computer Programming.]] ABADI, M., BURROWS, M., KAUFMAN, C., AND LAMPSON, B. Authentication and delegation with smart-cards. In Theoretical Aspects of Computer Software, LNCS 526, Springer, 1991, pp. 326-345. Also Res. Rep. 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., Oct. 1990. To appear in Science of Computer Programming.]]"},{"key":"e_1_2_1_2_2","first-page":"1","volume-title":"Advances in Cryptology-- Crypto '91","author":"ABADI M.","year":"1992","unstructured":"ABADI , M. , BURROWS , M. , LAMPSON , B. , AND PLOTKIN , G. A calculus for access control in distributed systems . In Advances in Cryptology-- Crypto '91 , LNCS 576, Springer , 1992 , pp. 1 - 23 . Also Res. Rep. 70, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., March 1991. To appear in ACM Trans. Program. Lang. Syst.]] 10.1145\/155183.155225 ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. A calculus for access control in distributed systems. In Advances in Cryptology-- Crypto '91, LNCS 576, Springer, 1992, pp. 1-23. Also Res. Rep. 70, Systems Research Center, Digital Equipment Corp., Palo Alto, Calif., March 1991. To appear in ACM Trans. Program. Lang. Syst.]] 10.1145\/155183.155225"},{"key":"e_1_2_1_3_2","first-page":"223","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif.","author":"BIRRELL A.","year":"1986","unstructured":"BIRRELL , A. , LAMPSON , B. , NEEDHAM , R. , AND SCHROEDER , M. Global authentication without global trust . In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif. , May 1986 ), pp. 223 - 230 .]] BIRRELL, A., LAMPSON, B., NEEDHAM, R., AND SCHROEDER, M. Global authentication without global trust. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1986), pp. 223-230.]]"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_2_1_5_2","volume-title":"CCITT 1988 Recommendation X.509","author":"CCITT.","year":"1989","unstructured":"CCITT. Information Processmg Systems -- Open Systems Interconnectmn -- The Directory Authentication Framework . CCITT 1988 Recommendation X.509 . Also ISO\/IEC 9594-8 : 1989 .]] CCITT. Information Processmg Systems -- Open Systems Interconnectmn -- The Directory Authentication Framework. CCITT 1988 Recommendation X.509. Also ISO\/IEC 9594-8:1989.]]"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.294.0526"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/94574.94579"},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_2_1_9_2","volume-title":"Trusted Computer System Evaluation Criteria. DOD 5200.28- STD","author":"DEPARTMENT OF DEFENSE.","year":"1985","unstructured":"DEPARTMENT OF DEFENSE. Trusted Computer System Evaluation Criteria. DOD 5200.28- STD , 1985 .]] DEPARTMENT OF DEFENSE. Trusted Computer System Evaluation Criteria. DOD 5200.28- STD, 1985.]]"},{"key":"e_1_2_1_10_2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"DIFFIE W.","year":"1976","unstructured":"DIFFIE , W. AND HELLMAN , M. New directions m cryptography. IEEE Trans. Inf. Theor. IT- 22 , 6 ( Nov. 1976 ), 644-654.]] DIFFIE, W. AND HELLMAN, M. New directions m cryptography. IEEE Trans. Inf. Theor. IT- 22, 6 (Nov. 1976), 644-654.]]","journal-title":"IEEE Trans. Inf. Theor. IT-"},{"key":"e_1_2_1_11_2","first-page":"19.7.1","volume-title":"Proceedtngs of the IEEE 1992 Custom Integrated Circuit Conference","author":"EBERLE H.","year":"1992","unstructured":"EBERLE , H. AND THACKER , C. A i Gbit\/second GaAs DES chip. In Proceedtngs of the IEEE 1992 Custom Integrated Circuit Conference ( Boston, Mass. , May 1992 ), pp. 19.7.1 - 19.7.4 .]] EBERLE, H. AND THACKER, C. A i Gbit\/second GaAs DES chip. In Proceedtngs of the IEEE 1992 Custom Integrated Circuit Conference (Boston, Mass., May 1992), pp. 19.7.1-19.7.4.]]"},{"key":"e_1_2_1_12_2","first-page":"305","volume-title":"Proceedings of the 12th National Computer Securzty Conference","author":"GASSER M.","year":"1989","unstructured":"GASSER , M. , GOLDSTEIN , A. , KAUFMAN , C. , AND LAMPSON , B. The Digital distributed system security architecture . In Proceedings of the 12th National Computer Securzty Conference ( Baltimore, Md. , Oct. 1989 ), pp. 305 - 319 .]] GASSER, M., GOLDSTEIN, A., KAUFMAN, C., AND LAMPSON, B. The Digital distributed system security architecture. In Proceedings of the 12th National Computer Securzty Conference (Baltimore, Md., Oct. 1989), pp. 305-319.]]"},{"key":"e_1_2_1_13_2","first-page":"20","volume-title":"Proceedtngs of the IEEE Symposium on Securlty and Privacy (Oakland, Calif.","author":"GASSER M.","year":"1990","unstructured":"GASSER , M. , AND MCDERMOTT , E. An architecture for practical delegation in a distributed system . In Proceedtngs of the IEEE Symposium on Securlty and Privacy (Oakland, Calif. , May 1990 ), pp. 20 - 30 .]] GASSER, M., AND MCDERMOTT, E. An architecture for practical delegation in a distributed system. In Proceedtngs of the IEEE Symposium on Securlty and Privacy (Oakland, Calif., May 1990), pp. 20-30.]]"},{"key":"e_1_2_1_14_2","first-page":"286","volume-title":"Proceedings of the 13th Natwnal Computer Sec~rity Conference","author":"HERBISON B.","year":"1990","unstructured":"HERBISON , B. Low cost outboard cryptographic support for SILS and SP4 . In Proceedings of the 13th Natwnal Computer Sec~rity Conference ( Baltimore, Md. , Oct. 1990 ), pp. 286 - 295 .]] HERBISON, B. Low cost outboard cryptographic support for SILS and SP4. In Proceedings of the 13th Natwnal Computer Sec~rity Conference (Baltimore, Md., Oct. 1990), pp. 286-295.]]"},{"key":"e_1_2_1_15_2","volume-title":"Project Athena, MIT","author":"KOHL J.","year":"1990","unstructured":"KOHL , J. , NEUMAN , C. , AND STEINER , J The Kerberos network authentication service. Version 5, draft 3 , Project Athena, MIT , Cambridge , Mass ., Oct. 1990 .]] KOHL, J., NEUMAN, C., AND STEINER, J The Kerberos network authentication service. Version 5, draft 3, Project Athena, MIT, Cambridge, Mass., Oct. 1990.]]"},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_2_1_17_2","first-page":"31","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif.","author":"LINN J.","year":"1990","unstructured":"LINN , J. Practical authentication for distributed systems . Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif. , May 1990 ), pp. 31 - 40 .]] LINN, J. Practical authentication for distributed systems. Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May 1990), pp. 31-40.]]"},{"key":"e_1_2_1_18_2","volume-title":"FIPS Pub.","author":"NATIONAL BUREAU OF STANDARDS.","year":"1977","unstructured":"NATIONAL BUREAU OF STANDARDS. Data Encryption Standard . FIPS Pub. 46, Jan. 1977 .]] NATIONAL BUREAU OF STANDARDS. Data Encryption Standard. FIPS Pub. 46, Jan. 1977.]]"},{"key":"e_1_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_22_2","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology--Crypto '90","author":"RIVEST R.","year":"1991","unstructured":"RIVEST , R. The M D4 message digest algorithm . In Advances in Cryptology--Crypto '90 , Springer , 1991 , pp. 303 - 311 .]] RIVEST, R. The M D4 message digest algorithm. In Advances in Cryptology--Crypto '90, Springer, 1991, pp. 303-311.]]"},{"key":"e_1_2_1_23_2","volume-title":"July","author":"RIVEST R.","year":"1991","unstructured":"RIVEST , R. AND DUSSE , S. The MD5 Message-DzgestAlgorzthm. Internet Draft {MD5-A}: draft-rsadsi-rivest-md5-01.txt , July 1991 .]] RIVEST, R. AND DUSSE, S. The MD5 Message-DzgestAlgorzthm. Internet Draft {MD5-A}: draft-rsadsi-rivest-md5-01.txt, July 1991.]]"},{"key":"e_1_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_2_1_25_2","volume-title":"2nd ACM Symposium on Parallel Algorithms and Architectures (Crete","author":"SHAND M.","year":"1990","unstructured":"SHAND , M. , BERTIN , P. , AND VUILLEMIN , J. Resource tradeoffs in fast long integer multiplication . In 2nd ACM Symposium on Parallel Algorithms and Architectures (Crete , July 1990 ).]] 10.1145\/97444.97679 SHAND, M., BERTIN, P., AND VUILLEMIN, J. Resource tradeoffs in fast long integer multiplication. In 2nd ACM Symposium on Parallel Algorithms and Architectures (Crete, July 1990).]] 10.1145\/97444.97679"},{"key":"e_1_2_1_26_2","first-page":"191","volume-title":"Proceedings of the Usen~x Winter Conference","author":"STEINER J.","year":"1988","unstructured":"STEINER , J. , NEUMAN , C. , AND SCHILLER , J. Kerberos : An authentication service for open network systems . In Proceedings of the Usen~x Winter Conference ( Berkeley, Calif. , Feb 1988 ), pp. 191 - 202 .]] STEINER, J., NEUMAN, C., AND SCHILLER, J. Kerberos: An authentication service for open network systems. In Proceedings of the Usen~x Winter Conference (Berkeley, Calif., Feb 1988), pp. 191-202.]]"},{"key":"e_1_2_1_27_2","first-page":"232","volume-title":"Proceedings of the IEEE Symposium on Securzty and Prtvacy (Oakland, Calif.","author":"TARDO J.","year":"1991","unstructured":"TARDO , J. AND ALAGAPPAN , K. SPX : Global authentication using public key certificates . Proceedings of the IEEE Symposium on Securzty and Prtvacy (Oakland, Calif. , May 1991 ), pp. 232 - 244 .]] TARDO, J. AND ALAGAPPAN, K. SPX: Global authentication using public key certificates. Proceedings of the IEEE Symposium on Securzty and Prtvacy (Oakland, Calif., May 1991), pp. 232-244.]]"},{"key":"e_1_2_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/356909.356913"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/138873.138874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/138873.138874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:26Z","timestamp":1750258046000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/138873.138874"}},"subtitle":["theory and practice"],"short-title":[],"issued":{"date-parts":[[1992,11]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1992,11]]}},"alternative-id":["10.1145\/138873.138874"],"URL":"https:\/\/doi.org\/10.1145\/138873.138874","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"value":"0734-2071","type":"print"},{"value":"1557-7333","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,11]]},"assertion":[{"value":"1992-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}