USING KERBEROS TO SECURE TLS PROTOCOL

被引:0
|
作者
Raluca, Catargiu [1 ]
Monica, Borda [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Commun, Cluj Napoca, Romania
关键词
component; TLS protocol; Kerberos protocol;
D O I
10.1109/ISETC.2010.5679334
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is a survey on how the Kerberos V5 can be transported over TLS protocol in order to provide additional security features. This document describes an extensibility mechanism for Kerberos V5 protocol which improve the security in TLS protocol.
引用
收藏
页码:237 / 240
页数:4
相关论文
共 50 条
  • [21] CAN KERBEROS REALLY MAKE UNIX SECURE
    TABER, M
    DATAMATION, 1993, 39 (01): : 59 - &
  • [22] What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS
    Alashwali, Eman Salem
    Rasmussen, Kasper
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 468 - 487
  • [23] Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
    Kirsal, Yoney
    Gemikonakli, Orhan
    GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 56 - 63
  • [24] Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
    Anakath, A. S.
    Ambika, S.
    Rajakumar, S.
    Kannadasan, R.
    Kumar, K. S. Sendhil
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (02): : 833 - 847
  • [25] Toward a secure Kerberos key exchange with smart cards
    Mavrogiannopoulos, Nikos
    Pashalidis, Andreas
    Preneel, Bart
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (03) : 217 - 228
  • [26] 3-Level Secure Kerberos Authentication for Smart Home Systems Using IoT
    Gaikwad, Pranay P.
    Gabhane, Jyotsna P.
    Golait, Snehal S.
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 262 - 268
  • [27] Toward a secure Kerberos key exchange with smart cards
    Nikos Mavrogiannopoulos
    Andreas Pashalidis
    Bart Preneel
    International Journal of Information Security, 2014, 13 : 217 - 228
  • [28] Performance analysis of the Kerberos protocol in a distributed environment
    ElHadidi, MT
    Hegazi, NH
    Aslan, HK
    SECOND IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1997, : 235 - 239
  • [29] Kerberos based public key authentication protocol
    Sheng, Huanye
    Wang, Jue
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 39 - 42
  • [30] Secure coprocessor integration with Kerberos V5
    Itoi, N
    USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 113 - 128