Kerberos Authentication Deployment Policy of US in Big data Environment
نویسندگان
چکیده
منابع مشابه
Modification on Kerberos Authentication Protocol in Grid Computing Environment
The Kerberos is applied widely in OS and grid computing environment. The Kerberos system isn’t secure enough for symmetrical encryption. The paper describes a method that transform symmetrical key into asymmetric encryption on the basis of keeping symmetrical key of one side changeless. The algorithm strengthens the security of Kerberos protocol through proofing.
متن کاملExtensible Pre-Authentication in Kerberos
EXTENSIBLE PRE-AUTHENTICATION IN KERBEROS Phillip Hellewell Department of Computer Science Master of Science Organizations need to provide services to a wide range of people, including strangers outside their local security domain. As the number of users grows larger, it becomes increasingly tedious to maintain and provision user accounts. It remains an open problem to create a system for provi...
متن کاملKerberos - Based Authentication in Grid Computing
Ich erkläre hiermit, dass ich die vor-liegende Arbeit selbständig verfasst und keine anderen als die angegebe-nen Quellen und Hilfsmittel verwen-det habe. I hereby declare that I have written this thesis by myself, and that I did not use any sources or tools other than the ones declared in the thesis. Acknowledgements My thanks go to all those who have supported me during the work for this thes...
متن کاملVerifying Confidentiality and Authentication in Kerberos 5
We present results from a recent project analyzing Kerberos 5. The main expected properties of this protocol, namely confidentiality and authentication, hold throughout the protocol. Our analysis also highlights a number of behaviors that do not follow the script of the protocol, although they do not appear harmful for the principals involved. We obtained these results by formalizing Kerberos 5...
متن کاملFormal Analysis of the Kerberos Authentication System
The Gurevich's Abstract State Machine formalism is used to specify the well known Kerberos Authentication System based on the Needham-Schroeder authentication protocol. A complete model of the system is reached through stepwise re nements of ASMs, and is used as a basis both to discover the minimum assumptions to guarantee the correctness of the system and to analyse its security weaknesses. Ea...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Digital Policy and Management
سال: 2013
ISSN: 1738-1916
DOI: 10.14400/jdpm.2013.11.11.435