Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Kerberos: an authentication service for computer networks

Published: 01 September 1994 Publication History

Abstract

When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to falsely claim another's identity. Kerberos is the most commonly used example of this type of authentication technology. The authors concentrate on authentication for real-time, interactive services that are offered on computer networks. They use the term real-time loosely to mean that a client process is waiting for a response to a query or command so that it can display the results to the user, or otherwise continue performing its intended function. This class of services includes remote login, file system reads and writes, and information retrieval for applications like Mosaic

Cited By

View all
  • (2024)XRAS at 10 Years: Allocations Software as a Service for the NSF HPC ecosystemPractice and Experience in Advanced Research Computing 2024: Human Powered Computing10.1145/3626203.3670515(1-8)Online publication date: 17-Jul-2024
  • (2024)EPP-GAS: An Efficient and Privacy-Preserving Cross Trust-Domain Group Authentication Scheme for Vehicle Platoon Based on BlockchainIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.344661825:12(19744-19756)Online publication date: 29-Aug-2024
  • (2024)PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern LeakageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339253319(5075-5089)Online publication date: 22-Apr-2024
  • Show More Cited By
  1. Kerberos: an authentication service for computer networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image IEEE Communications Magazine
      IEEE Communications Magazine  Volume 32, Issue 9
      September 1994
      68 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 September 1994

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 14 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)XRAS at 10 Years: Allocations Software as a Service for the NSF HPC ecosystemPractice and Experience in Advanced Research Computing 2024: Human Powered Computing10.1145/3626203.3670515(1-8)Online publication date: 17-Jul-2024
      • (2024)EPP-GAS: An Efficient and Privacy-Preserving Cross Trust-Domain Group Authentication Scheme for Vehicle Platoon Based on BlockchainIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.344661825:12(19744-19756)Online publication date: 29-Aug-2024
      • (2024)PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern LeakageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339253319(5075-5089)Online publication date: 22-Apr-2024
      • (2024)GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332697519(540-554)Online publication date: 1-Jan-2024
      • (2024)TSAPP: Threshold Single-Sign-On Authentication Preserving PrivacyIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.328539321:4(1515-1527)Online publication date: 1-Jul-2024
      • (2024)Survey on Unified Threat Management (UTM) Systems for Home NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2024.338247026:4(2459-2509)Online publication date: 1-Oct-2024
      • (2024)A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future DirectionsWireless Personal Communications: An International Journal10.1007/s11277-024-11382-y137:1(153-197)Online publication date: 1-Jul-2024
      • (2024)Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart citiesCluster Computing10.1007/s10586-024-04429-z27:7(9395-9414)Online publication date: 1-Oct-2024
      • (2023)Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand VulnerabilitiesDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-35504-2_9(177-197)Online publication date: 12-Jul-2023
      • (2022)Cloud based evaluation of databases for stock market dataJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-022-00323-411:1Online publication date: 29-Sep-2022
      • Show More Cited By

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media