Automated access, key, certificate, and credential management

作者: Tatu J. Ylonen

DOI:

关键词: Key (cryptography)Access keyKey managementComputer securityCredential managementCertificateKerberosWorld Wide WebComputer science

摘要: Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. also certificates, Kerberos credentials, cryptographic keys. remediating legacy key problems automating configuration keys, as well continuous monitoring.

参考文章(99)
Charles B. Thier, Antony Joel Messerli, Gregory Lee Holt, John A. Dickinson, Jason LuVern Kolker, Trey Eugene Morris, Matthew Charles Dietz, Paul Voccio, Vishvananda Ishaya, Alexander Walsh, Christopher James Behrens, Ziad Sawalha, Edward Leafe, William Randolph Mathews, Yogeshwar Srikrishan, Pluggable Allocation in a Cloud Computing System ,(2012)
Li-Fen Wu, Renee M. Rinker, Nicholas D. Judge, Ken L. Ingle, Olga B. Zvereva, Kerstin Weinberg, Automated secure key transfer ,(2003)
Violeta Cakulev, Ganapathy Subramanian Sundaram, Loannis Broustis, Methods And Apparatuses For Maintaining Secure Communication Between A Group Of Users In A Social Network ,(2013)
James Lavine, Gregory G. Raleigh, Jose Tellado, Vien-Phuong Nguyen, James Fitzgerald, Nathaniel Hunsperger, Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device ,(2013)