[go: up one dir, main page]

Kohl et al., 1991 - Google Patents

The evolution of the Kerberos authentication service

Kohl et al., 1991

View PDF
Document ID
11999676817212503587
Author
Kohl J
Neuman B
Theodore Y
Publication year
Publication venue
Proceedings of the Spring 1991 EurOpen Conference

External Links

Snippet

ABSTRACT The Kerberos Authentication Service, developed at MIT, has been widely adopted by other organizations to identify clients of network services across an insecure network and to protect the privacy and integrity of communication with those services. While …
Continue reading at www.cs.unibo.it (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications

Similar Documents

Publication Publication Date Title
Kohl et al. The evolution of the Kerberos authentication service
Kohl et al. The evolution of the Kerberos authentication service
Bird et al. The kryptoknight family of light-weight protocols for authentication and key distribution
Kohl et al. The Kerberos network authentication service (V5)
Kohl et al. RFC1510: The Kerberos network authentication service (V5)
US7395549B1 (en) Method and apparatus for providing a key distribution center without storing long-term server secrets
JP4955181B2 (en) Method and apparatus for managing secure collaborative transactions
US6490679B1 (en) Seamless integration of application programs with security key infrastructure
US6192130B1 (en) Information security subscriber trust authority transfer system with private key history transfer
McMahon SESAME V2 public key and authorisation extensions to Kerberos
El-Emam et al. An optimized Kerberos authentication protocol
CN112035820B (en) Data analysis method used in Kerberos encryption environment
El-Ema et al. A network authentication protocol based on Kerberos
O'Connell et al. Jfs: a secure distributed file system for network computers
Cui et al. Approaching secure communications in a message-oriented mobile computing environment
Gábor Evaluation of distributed authentication, authorization and directory services
Anderson Architecture for Public-Key Infrastructure
CUI et al. E-mail: Tom_gray@ mitel. com, Serge_mankovski@ mitel. com
Neuman STATUS OF THIS MEMO
Parnell Anonymous authentication of membership in dynamic groups
Sriramulu et al. A Secure Network Communication Based on Kerberos & MD5
Raghunathan A security model for mobile agent environments using X. 509 proxy certificates
El-Hennawy et al. An Adaptive Kerberos Authentication Protocol With Digital Envelop Technique
Andrew Kerberos: A Review of the Modification in Versions 4-To-5 Transition
Belostotsky Secure SNMP