USING KERBEROS TO SECURE TLS PROTOCOL

被引:0
|
作者
Raluca, Catargiu [1 ]
Monica, Borda [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Commun, Cluj Napoca, Romania
关键词
component; TLS protocol; Kerberos protocol;
D O I
10.1109/ISETC.2010.5679334
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is a survey on how the Kerberos V5 can be transported over TLS protocol in order to provide additional security features. This document describes an extensibility mechanism for Kerberos V5 protocol which improve the security in TLS protocol.
引用
收藏
页码:237 / 240
页数:4
相关论文
共 50 条
  • [31] Implementation of a secure TLS coprocessor on an FPGA
    Hamilton, Mark
    Marnane, William P.
    MICROPROCESSORS AND MICROSYSTEMS, 2016, 40 : 167 - 180
  • [32] Electrocardiogram-Kerberos Authentication Scheme for Secure Services
    Prakasha, Krishna
    Muniyal, Balachandra
    Kavyashree
    Deeksha
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 91 - 94
  • [33] Secure Secret-Key Management of Kerberos Service
    Cao, Lai-Cheng
    EMERGING RESEARCH IN ARTIFICIAL INTELLIGENCE AND COMPUTATIONAL INTELLIGENCE, 2011, 237 : 76 - 83
  • [34] Kerberos Secured Address Resolution Protocol (KARP)
    Bakhache, Bassem
    Rostom, Rabiha
    2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2015, : 210 - 215
  • [35] Study on Kerberos Protocol Based on Fuzzy Control
    Jian, Yang
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I, 2009, : 290 - 292
  • [36] Further Improvements to the Kerberos Timed Authentication Protocol
    Kirsal, Y.
    Gemikonakli, O.
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 549 - 554
  • [37] Which Secure Transport Protocol for a Reliable HTTP/2-based Web Service : TLS or QUIC ?
    Saverimoutou, Antoine
    Mathieu, Bertrand
    Vaton, Sandrine
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 879 - 884
  • [38] Improved Authentication Model Based on Kerberos Protocol
    You, Xine
    Zhang, Lingfeng
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 593 - 599
  • [39] Training Scenario for Security Testing of the Kerberos Protocol
    Lazarov, Willi
    Bohacik, Antonin
    Kohout, David
    Fujdiak, Radek
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND APPLICATIONS, IEA-AIE 2024, 2024, 14748 : 56 - 67
  • [40] VSPAKE: Provably secure verifier-based PAKE protocol for client/server model in TLS ciphersuite
    Qi, Mingping
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 148