The Kerberos Network Authentication Service (V5)

作者: C. Neuman , J. Kohl

DOI:

关键词: Project AthenaKerberosGeneric Security Service Algorithm for Secret Key TransactionThe InternetService (systems architecture)Computer scienceAuthenticationKerberized Internet Negotiation of KeysProtocol (object-oriented programming)Computer network

摘要: This document gives an overview and specification of Version 5 the protocol for Kerberos network authentication system. 4, described elsewhere [1,2], is presently in production use at MIT's Project Athena, other Internet sites.

参考文章(6)
Dorothy E. Denning, Giovanni Maria Sacco, Timestamps in key distribution protocols Communications of The ACM. ,vol. 24, pp. 533- 536 ,(1981) , 10.1145/358722.358740
B.C. Neuman, T. Ts'o, Kerberos: an authentication service for computer networks IEEE Communications Magazine. ,vol. 32, pp. 33- 38 ,(1994) , 10.1109/35.312841
P. V. Mockapetris, Domain names - implementation and specification Domain names - implementation and specification. ,vol. 1035, pp. 1- 55 ,(1987)
B.C. Neuman, Proxy-based authorization and accounting for distributed systems international conference on distributed computing systems. pp. 283- 291 ,(1993) , 10.1109/ICDCS.1993.287698
Clifford Neuman, Jennifer G. Steiner, Athena, Jeffrey I. Schiller, Kerberos: An Authentication Service for Open Network Systems USENIX Winter. pp. 191- 202 ,(1988)
Roger M. Needham, Michael D. Schroeder, Using encryption for authentication in large networks of computers Communications of the ACM. ,vol. 21, pp. 993- 999 ,(1978) , 10.1145/359657.359659