GISI 95 pp 266-273 | Cite as

Authentifikations- und Schlüsselverteilsysteme

  • Rolf Oppliger
Conference paper
Part of the Informatik aktuell book series (INFORMAT)

Zusammenfassung

In Computernetzen und verteilten Systemen werden Authentifikations- und Schlüsselverteilsysteme eingesetzt, um auf der Anwendungsschicht Sicherheitsdienste anbieten zu können. In diesem Beitrag werden die Authentifikations- und Schlüsselverteilsysteme Kerberos (OSF DCE), NetSP, SPX, TESS und SESAME vorgestellt, diskutiert und miteinander verglichen.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ISO /IEC, “Information Processing Systems - Open Systems Interconnection Reference Model - Part 2: Security Architecture”, ISO/IEC 7498–2, 1989.’Google Scholar
  2. 2.
    R. Oppliger, Computersicherheit - Eine Einführung, Vieweg-Verlag, 1992.MATHGoogle Scholar
  3. 3.
    B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., New York, 1994.Google Scholar
  4. 4.
    C. Kaufman, R. Perlman, and M. Spenciner, Network Security: Private Communication in a Public World, Prentice Hall, Englewood Cliffs, N.J., 1995.Google Scholar
  5. 5.
    J.I. Schiller, “Secure Distributed Computing”, Scientific American, pp. 72–76, November 1994.Google Scholar
  6. 6.
    R. Bird, I. Gopal, A. Herzberg, P.A. Janson, S. Kutten, R. Molva, and M. Yung, “The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution”, IEEE/ACM Transactions on Networking, vol. 3, pp. 31–41, February 1995.CrossRefGoogle Scholar
  7. 7.
    J.J. Tardo and K. Alagappan, “SPX: Global Authentification Using Public Key Certificates”, in Proceedings of the IEEE Symposium on Security and Privacy, pp. 232–244, Los Alamitos, California, 1991. IEEE Computer Society Press.Google Scholar
  8. 8.
    Th. Beth and D. Gollmann, “Security Systems Based on Exponentiation Primitives: TESS - The Exponential Security System”, in Proceedings of the IFIP TCll Tenth International Conference on Information Security, IFIP SEC’94, 1994, Curacao, May 23- 27, 1994.Google Scholar
  9. 9.
    P.V. McMahon, “SESAME V2 Public Key and Authorisation Extensions to Kerberos”in Proceedings of the Internet Society Symposium on Network and Distributed System Security, pp. 114–131, February 1995.CrossRefGoogle Scholar
  10. 10.
    A. Grossmann, “Analyse und Beurteilung des OSF DCE Sicherheitssystems”, Diplomarbeit, Universitat Bern, 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • Rolf Oppliger
    • 1
  1. 1.Institut für Informatik und angewandte Mathematik (IAM)Universität BernBernSwitzerland

Personalised recommendations