期刊文献+

Kerberos协议及其授权扩展的研究与设计 被引量:3

Research and Design of Kerberos Protocol Extended in Authorization
在线阅读 下载PDF
导出
摘要 尽管Kerberos协议被证明是一种在分布式网络环境下最理想的身份认证系统,却存在一些安全缺陷和协议结构自身的局限性。虽然大部分得到了有效改进,问题依然存在。在深刻理解Kerberos协议思想的基础上,提出了一种基于Ker-beros认证协议的授权扩展系统。该系统在不改变原Kerberos认证流程的情况下,充分利用票据机制加载基于角色的访问控制信息,成功实现了Kerberos认证与授权功能的无缝集成。 Though it has been proved that Kerberos protocol is the best authentication system in distributed network environment, there' re still some limitations in security and protocol structure. Some of these problems are improved, while others still exist. With thorough studying of the principle of Kerberos protocol, this paper proposes an improved Kerberos protocol extended in authorization. The system can fully exploit tickets mechanism to load role- based access control information and successfully realize the seamless integration of Kerberos authentication and authorization.
作者 马佩勋 李杰
出处 《计算机技术与发展》 2006年第5期109-111,114,共4页 Computer Technology and Development
关键词 KERBEROS 认证 授权 票据 角色 Kerberos authentication authorization ticket roles
  • 相关文献

参考文献8

  • 1Bellovin S M, Merritt M. Limitations of the Kerberos Authentication System[J]. ACM SIGCOMM Computer Communication Review, 1990,20(5):119- 132.
  • 2Kehne A, SChonwalder J, Langendorfer H.A nonce-based protocol for multiple authentication[J]. Operating Systems Review,1992, 26(4) :84-89.
  • 3Itoi N, Honeyman P. Smartcard integration with kerberos v5[J]. Lecture Notes in Computer Science, 2001,2041 : 73 - 78.
  • 4刘克龙,卿斯汉,蒙杨.一种利用公钥体制改进Kerberos协议的方法[J].软件学报,2001,12(6):872-877. 被引量:34
  • 5文铁华,谷士文.增强Kerberos协议安全性的改进方案[J].通信学报,2004,25(6):76-79. 被引量:24
  • 6Steiner J G,Neuman B C,schiller J I. Kerberos: An Authentication Service for Open Network Systems[A]. In Proceedings of the {USENIX} Technical Conference[C].[s.l.] : USENIX Association, 1988. 191 - 202.
  • 7Neuman B C. Proxy- Based Authorization and Accounting for Distributed Systems [A]. International Conference on Distributed Computing Systems [C]. [s.l.] : The .Washington Technology Center, 1993.283 - 291.
  • 8Au R, Looi M,Ashley P. Cross- domain one- shot authorization using smart cards[A]. In Proceedings of the 7th ACM conference on Computer and communications security [C]. [s.l] :ACM Press,2000. 220 - 227.

二级参考文献6

  • 1NEUMAN C. RFC 1510,The Kerberos Network Authentication Service(V5)[S].1993.
  • 2STEINER GKerberos: an authentication service for open network system[A]. Proceedings of the Winter 1988 Usenix Conference[C]. 1988.
  • 3BELLOVIN S M, MERRITT M. Limitations of the Kerberos authentication system[A]. Proceedings of the Winter 1991 UsenixConference[C]. 1991.
  • 4SILVERMAN J H. The Xedui calculus and the elliptic curve discrete logarithm problem[J]. Designs, Codes and Cryptography, 2000.20(1): 5-40.
  • 5MENEZES A. Elliptic Curve Public Key Cryptosystems[M]. Kluwer Academic Publishers, 1993.
  • 6蒙杨,刘克龙,卿斯汉,yahoo.com.一种新型的综合型安全系统研究[J].软件学报,2000,11(5):616-619. 被引量:6

共引文献47

同被引文献17

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部