Robust Authentication Procedures
Next:
Identification and Authentication
Up:
Improving Security in
Previous:
The Role of
Robust Authentication Procedures
Identification and Authentication
Distributed System Authentication
The Need: Identity Authentication
Properties of Distributed Athentication Systems
The Protocol Used to Verify the Authentication
The Principals
The Areas of the Network Where Trust is Placed
The Areas of the Network Where Secrets are Kept
The Key Generation and Distribution Models Used
The Composition of the Ticket/Certificate
Kerberos
The Protocol Used to Verify the Authentication
The Principals
The Areas of the Network Where Trust is Placed
The Areas of the Network Where Secrets are Kept
The Key Generation and Distribution Model Used
The Composition of the Ticket/Certificate
Secure RPC
The Protocol Used to Verify the Authentication
The Principals
The Areas of the Network Where Trust is Placed
The Areas of the Network Where Secrets are Kept
Key Generation and Distribution Model Used
The Composition of the Ticket/Certificate
Concerns with Kerberos and Secure RPC
Secure RPC
Kerberos
John Barkley
Fri Oct 7 16:17:21 EDT 1994