Kerberos Authentication Deployment Policy of US in Big data Environment

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modification on Kerberos Authentication Protocol in Grid Computing Environment

The Kerberos is applied widely in OS and grid computing environment. The Kerberos system isn’t secure enough for symmetrical encryption. The paper describes a method that transform symmetrical key into asymmetric encryption on the basis of keeping symmetrical key of one side changeless. The algorithm strengthens the security of Kerberos protocol through proofing.

متن کامل

Extensible Pre-Authentication in Kerberos

EXTENSIBLE PRE-AUTHENTICATION IN KERBEROS Phillip Hellewell Department of Computer Science Master of Science Organizations need to provide services to a wide range of people, including strangers outside their local security domain. As the number of users grows larger, it becomes increasingly tedious to maintain and provision user accounts. It remains an open problem to create a system for provi...

متن کامل

Kerberos - Based Authentication in Grid Computing

Ich erkläre hiermit, dass ich die vor-liegende Arbeit selbständig verfasst und keine anderen als die angegebe-nen Quellen und Hilfsmittel verwen-det habe. I hereby declare that I have written this thesis by myself, and that I did not use any sources or tools other than the ones declared in the thesis. Acknowledgements My thanks go to all those who have supported me during the work for this thes...

متن کامل

Verifying Confidentiality and Authentication in Kerberos 5

We present results from a recent project analyzing Kerberos 5. The main expected properties of this protocol, namely confidentiality and authentication, hold throughout the protocol. Our analysis also highlights a number of behaviors that do not follow the script of the protocol, although they do not appear harmful for the principals involved. We obtained these results by formalizing Kerberos 5...

متن کامل

Formal Analysis of the Kerberos Authentication System

The Gurevich's Abstract State Machine formalism is used to specify the well known Kerberos Authentication System based on the Needham-Schroeder authentication protocol. A complete model of the system is reached through stepwise re nements of ASMs, and is used as a basis both to discover the minimum assumptions to guarantee the correctness of the system and to analyse its security weaknesses. Ea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Digital Policy and Management

سال: 2013

ISSN: 1738-1916

DOI: 10.14400/jdpm.2013.11.11.435