Corpus ID: 222257682

Kerberos: An Authentication Service for Open Network Systems

@inproceedings{Steiner1988KerberosAA,
  title={Kerberos: An Authentication Service for Open Network Systems},
  author={J. G. Steiner and B. C. Neuman and J. Schiller},
  booktitle={USENIX Winter},
  year={1988}
}
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users' identities. This paper gives an overview of the Kerberos authentication model as imple- mented for MIT's Project Athena. It describes the protocols used by clients, servers, and Kerberos to achieve authentication. It also describes the management and… Expand
Kerberos: an authentication service for computer networks
Heuristic authentication protocol for TCP/IP network applications under UNIX
Beacons for Authentication in Distributed Systems
End User Authentication (EUA) Model and Password for Security
Beacon based approach to network security
A Complete Secure Transport Service in the Internet
On inter-realm authentication in large distributed systems
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 32 REFERENCES
Design and implementation of the Sun network filesystem
The Hesiod Name Server
Berkeley UNIX on 1000 Workstations: Athena Changes to 4.3BSD
National Bureau of Standards
Berkeley Unix on 1000 Workstations: MODIFIED NFS Athena Changes to 4
  • Usenix Conference Proceedings
  • 1988
Jedlindata is still sent across the network in an unencrypted, and sky The Zephyr Notitherefore interceptable, form. The low-level, per-transaction fication System
  • Usenix Conference Proceedings, authentication is based on a ͗CLIENT-IP-ADDRESS, CLIENT(Winter
  • 1988
...
1
2
3
4
...