Kohl et al., 1991 - Google Patents
The evolution of the Kerberos authentication serviceKohl et al., 1991
View PDF- Document ID
- 11999676817212503587
- Author
- Kohl J
- Neuman B
- Theodore Y
- Publication year
- Publication venue
- Proceedings of the Spring 1991 EurOpen Conference
External Links
Snippet
ABSTRACT The Kerberos Authentication Service, developed at MIT, has been widely adopted by other organizations to identify clients of network services across an insecure network and to protect the privacy and integrity of communication with those services. While …
- 238000004891 communication 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kohl et al. | The evolution of the Kerberos authentication service | |
Kohl et al. | The evolution of the Kerberos authentication service | |
Bird et al. | The kryptoknight family of light-weight protocols for authentication and key distribution | |
Kohl et al. | The Kerberos network authentication service (V5) | |
Kohl et al. | RFC1510: The Kerberos network authentication service (V5) | |
US7395549B1 (en) | Method and apparatus for providing a key distribution center without storing long-term server secrets | |
JP4955181B2 (en) | Method and apparatus for managing secure collaborative transactions | |
US6490679B1 (en) | Seamless integration of application programs with security key infrastructure | |
US6192130B1 (en) | Information security subscriber trust authority transfer system with private key history transfer | |
McMahon | SESAME V2 public key and authorisation extensions to Kerberos | |
El-Emam et al. | An optimized Kerberos authentication protocol | |
CN112035820B (en) | Data analysis method used in Kerberos encryption environment | |
El-Ema et al. | A network authentication protocol based on Kerberos | |
O'Connell et al. | Jfs: a secure distributed file system for network computers | |
Cui et al. | Approaching secure communications in a message-oriented mobile computing environment | |
Gábor | Evaluation of distributed authentication, authorization and directory services | |
Anderson | Architecture for Public-Key Infrastructure | |
CUI et al. | E-mail: Tom_gray@ mitel. com, Serge_mankovski@ mitel. com | |
Neuman | STATUS OF THIS MEMO | |
Parnell | Anonymous authentication of membership in dynamic groups | |
Sriramulu et al. | A Secure Network Communication Based on Kerberos & MD5 | |
Raghunathan | A security model for mobile agent environments using X. 509 proxy certificates | |
El-Hennawy et al. | An Adaptive Kerberos Authentication Protocol With Digital Envelop Technique | |
Andrew | Kerberos: A Review of the Modification in Versions 4-To-5 Transition | |
Belostotsky | Secure SNMP |