2013
DOI: 10.4304/jnw.8.2.290-296
|View full text |Cite
|
Sign up to set email alerts
|

XKDCP: An Inter-KDC Protocol for Dependable Kerberos Cross-Realm Operations

Abstract: The wide popularity of Kerberos made it the de-facto standard for authentication in enterprise networks
Moreover, the lightweight nature of Kerberos makes it a candidate of choice for securing network communications in emerging non-enterprise information systems such as industrial control networks, building automation and intelligent transportation systems. Many of these potential applications of Kerberos involve infrastructures characterized by their large scale and strict dependability requirements. Ho…
Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…A database of principals is maintained and secret keys are shared between authority and each one of principals. The protocol realizes user's access to offered services in three types of exchanges developed in three types of operations: the protocol exchanges include the Authentication Server (AS) exchange, the Ticket Granting Service (TGS) exchange and the Server Provider (AP) exchange [16]. The process is shown in figure 4.…”
Section: Proposed Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…A database of principals is maintained and secret keys are shared between authority and each one of principals. The protocol realizes user's access to offered services in three types of exchanges developed in three types of operations: the protocol exchanges include the Authentication Server (AS) exchange, the Ticket Granting Service (TGS) exchange and the Server Provider (AP) exchange [16]. The process is shown in figure 4.…”
Section: Proposed Protocolmentioning
confidence: 99%
“…It has several characteristics that make it an ideal candidate for implementing authentication systems for ubiquitous applications. Two of the main characteristics consist of re-use of cached security credentials and the use of lightweight symmetric key cryptography [16]. Key management can be based on trust relationships [14].…”
Section: Security System Modelmentioning
confidence: 99%
See 1 more Smart Citation