Authors: Prof. Ms. Padmavati S Dandannavar and Prof. Shri. Prasanna H.Bammigatti
In distributed-computing environments, applications or users have to share resources and communicate with each other to perform their jobs more efficiently. With the increase of the shared information and resources in the distributed system and for better performance, it is important to keep resources and the information integrity from the unexpected use by unauthorized user. Unauthorized access to the information by illegal users leads to the leakage of the data also increases. To protect the information in a distributed computing environment, it is necessary to secure the data through the user authentication and access control policy. This kind of policy has to be offered transparently to users or application programs for the convenient use of the system.