Kerberos: an authentication service for computer networks
- 1 September 1994
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Magazine
- Vol. 32 (9) , 33-38
- https://doi.org/10.1109/35.312841
Abstract
When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to falsely claim another's identity. Kerberos is the most commonly used example of this type of authentication technology. The authors concentrate on authentication for real-time, interactive services that are offered on computer networks. They use the term real-time loosely to mean that a client process is waiting for a response to a query or command so that it can display the results to the user, or otherwise continue performing its intended function. This class of services includes remote login, file system reads and writes, and information retrieval for applications like Mosaic.Keywords
This publication has 12 references indexed in Scilit:
- Proxy-based authorization and accounting for distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Toward a national public key infrastructureIEEE Communications Magazine, 1994
- Generic Security Service Application Program InterfacePublished by RFC Editor ,1993
- The Kerberos Network Authentication Service (V5)Published by RFC Editor ,1993
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- Project Athena as a distributed computer systemComputer, 1990
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976