Jennifer G. Steiner

Learn More
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users' identities. This paper gives an overview of the Kerberos authentication model as implemented for MIT's Project(More)
When distributed systems first appeared, they were programmed in traditional sequential languages, usually with the addition of a few library procedures for sending and receiving messages. As distributed applications became more commonplace and more sophisticated, this ad hoc approach became less satisfactory. Researchers all over the world began designing(More)
26 In this paper, we have omitted discussion of many of the more practical details due to length limitation. For example, the problems of consistency (due to cache invalidation and certiicate expiration), group membership maintenance and propagation of authorization must be addressed in an implementation. A prototype implementation of our design is(More)
been asking for, the customer can optionally contact the CC. The CC examines the ngerprint of the service which is always attached to the service result. If the veriication by the CC fails (i.e. the ngerprint is incorrect) then the customer knows that he has contacted a fraud merchant. At this point, the customer can at least be sure that he he will not be(More)
A symmetric Key-Distribution Center is a trusted server that knows each user's password. The KDC issues temporary session-keys to users who know their passwords. Each user's initial session-key comes to him under his password's encryption. The KDC then uses this initial key to encrypt the user's subsequent session keys. 1. Account-Creation: The user proves(More)
  • 1