Authentifikations- und Schlüsselverteilsysteme
Conference paper
Zusammenfassung
In Computernetzen und verteilten Systemen werden Authentifikations- und Schlüsselverteilsysteme eingesetzt, um auf der Anwendungsschicht Sicherheitsdienste anbieten zu können. In diesem Beitrag werden die Authentifikations- und Schlüsselverteilsysteme Kerberos (OSF DCE), NetSP, SPX, TESS und SESAME vorgestellt, diskutiert und miteinander verglichen.
Preview
Unable to display preview. Download preview PDF.
References
- 1.ISO /IEC, “Information Processing Systems - Open Systems Interconnection Reference Model - Part 2: Security Architecture”, ISO/IEC 7498–2, 1989.’Google Scholar
- 2.R. Oppliger, Computersicherheit - Eine Einführung, Vieweg-Verlag, 1992.MATHGoogle Scholar
- 3.B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., New York, 1994.Google Scholar
- 4.C. Kaufman, R. Perlman, and M. Spenciner, Network Security: Private Communication in a Public World, Prentice Hall, Englewood Cliffs, N.J., 1995.Google Scholar
- 5.J.I. Schiller, “Secure Distributed Computing”, Scientific American, pp. 72–76, November 1994.Google Scholar
- 6.R. Bird, I. Gopal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, and M. Yung, “The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution”, IEEE/ACM Transactions on Networking, vol. 3, pp. 31–41, February 1995.CrossRefGoogle Scholar
- 7.J.J. Tardo and K. Alagappan, “SPX: Global Authentification Using Public Key Certificates”, in Proceedings of the IEEE Symposium on Security and Privacy, pp. 232–244, Los Alamitos, California, 1991. IEEE Computer Society Press.Google Scholar
- 8.Th. Beth and D. Gollmann, “Security Systems Based on Exponentiation Primitives: TESS - The Exponential Security System”, in Proceedings of the IFIP TCll Tenth International Conference on Information Security, IFIP SEC’94, 1994, Curacao, May 23- 27, 1994.Google Scholar
- 9.P.V. McMahon, “SESAME V2 Public Key and Authorisation Extensions to Kerberos”in Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 114–131, February 1995.CrossRefGoogle Scholar
- 10.A. Grossmann, “Analyse und Beurteilung des OSF DCE Sicherheitssystems”, Diplomarbeit, Universitat Bern, 1995.Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 1995