• Corpus ID: 16656697

Kerberos Active Directory for HP Thin Clients

@inproceedings{Anusha2014KerberosAD,
  title={Kerberos Active Directory for HP Thin Clients},
  author={Tenali Anusha and D. Saravana Priya and Prashanta Naik and B. Citrix Xen Server},
  year={2014}
}
A specialized field in computer networking involves securing computer network infrastructure. In today's computing, organizations including universities and small to medium-sized businesses have to credit a wide range of services to its users. Many of these services require a form of authentication and/or authorization to securely verify the identities of users. Thin clients are used in academic institutions, in financial sectors, for training students, for research purpose and many other areas… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 15 REFERENCES
Kerberos: an authentication service for computer networks
TLDR
The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic.
Vulnerabilities of LDAP As An Authentication Service
TLDR
The danger in the use of LDAP for user authentication is examined by executing a DoS attack exploiting the TCP three-way handshake required when initializing a connection to an LDAP server.
Implementation of highly efficient Authentication and Transaction Security
TLDR
Kerberos Encryption Technique is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography and there was an issue of cross- validation of the ticket by the transaction server.
Implementation of Crossrealm Referral Handling in the MIT Kerberos Client
TLDR
This paper presents the details of the two approaches to solve the Kerberos realm resolution problem, and proposes a new format for referral data that includes a list of alias names as part of the returned referral information.
Security implications in Kerberos by the introduction of smart cards
TLDR
This paper shows that card-based public key Kerberos is flawed, in particular, access to a user's card enables an adversary to impersonate that user even after the adversary's access to the card is revoked.
Securing Storage Appliances via UNIX based Kerberos Authentication
TLDR
This document helps storage systems to use UNIX-based Kerberos version 5 servers for NFS storage authentication using both NFS version 3 and 4 to achieve strong Nfs storage authentication.
Fabasoft on Linux Fabasoft Folio Web Management
  • 2013
Xen Server-Addressing the challenges of application and desktop virtualization
  • 2010
Implement two factor authentications for AIX using Kerberos
  • White Paper,
  • 2008
HP MFP Smart Card Authentication Solution
  • White Paper,
  • 2007
...
1
2
...