Lecture Operating systems: A concept-based approach: Chapter 21 - Dhananjay M. Dhamdhere
Lecture Operating systems: A concept-based approach: Chapter 21 - Dhananjay M. Dhamdhere
Presence of the network makes a distributed system susceptible to security attacks such as tampering of messages and masquerading, which can be launched through interprocess messages. This chapter discusses authentication and message security measures used in distributed operating systems to thwart such attacks. Methods of verifying authenticity of data are also discussed.