USING KERBEROS TO SECURE TLS PROTOCOL

被引:0
|
作者
Raluca, Catargiu [1 ]
Monica, Borda [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Commun, Cluj Napoca, Romania
关键词
component; TLS protocol; Kerberos protocol;
D O I
10.1109/ISETC.2010.5679334
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is a survey on how the Kerberos V5 can be transported over TLS protocol in order to provide additional security features. This document describes an extensibility mechanism for Kerberos V5 protocol which improve the security in TLS protocol.
引用
收藏
页码:237 / 240
页数:4
相关论文
共 50 条
  • [41] The OPTLS Protocol and TLS 1.3
    Krawczyk, Hugo
    Wee, Hoeteck
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 81 - 96
  • [42] Kerberos versus the Leighton-Micali protocol
    Rubin, AD
    DR DOBBS JOURNAL, 2000, 25 (11): : 21 - +
  • [43] An Improved TLS handshake protocol
    Li Xian-Zhu
    Liu Jun
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 130 - 136
  • [44] A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
    Sutradhar, Mukti Rani
    Sultana, Nigar
    Dey, Himel
    Arif, Hossain
    2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 239 - 244
  • [45] Secure fast handover in an Open Broadband Access Network using Kerberos-style tickets
    Jaatun, Martin Gilje
    Tondel, Inger Anne
    Paint, Frederic
    Johannessen, Tor Hjalmar
    Francis, John Charles
    Duranton, Claire
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 389 - +
  • [46] ONE THREE-POINT AUTHENTICATION PROTOCOL BASE ON KERBEROS PROTOCOL
    Ling Yun
    Jin Yun-Shuai
    Zhou Zong-He
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 1245 - 1251
  • [47] Secure internet voting system based on public key Kerberos
    Abd-alrazzq, Hussein Khalid
    Ibrahim, Mohammad S.
    Dawood, Omar Abdulrahman
    International Journal of Computer Science Issues, 2012, 9 (2 2-3): : 428 - 434
  • [48] Extending TLS to secure Multihost Applications Exchanges
    Badra, M.
    Jabeur, N.
    Sahli, N.
    Borghol, R.
    2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2012, : 2500 - 2505
  • [49] PoliCert: Secure and Flexible TLS Certificate Management
    Szalachowski, Pawel
    Matsumoto, Stephanos
    Perrig, Adrian
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 406 - 417
  • [50] SCM: Secure and accountable TLS certificate management
    Khan, Salabat
    Zhang, Zijian
    Zhu, Liehuang
    Rahim, Mussadiq Abdul
    Ahmad, Sadique
    Chen, Ruoyu
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)