Keeping the hackers at bay: Object Oriented Security
No performance is sufficient if you have to always recompute
- Need mechanism to provide security to thwart hackers
Protocol Independent Authentication Model
- Public or private key
- PGP, RSA, Kerberos, etc.
- Can be negotiated at run-time
Automatically called by client and server kernels
- Supplied via replaceable shared libraries
Client Objectivity Kernel creates security objects as needed
- Security objects supply context-sensitive authentication credentials
Works only with Extensible AMS via oofs interface