Loading...
Please wait, while we are loading the content...
Similar Documents
Security on the Move: Indirect Authentication Using Kerberos (1996)
| Content Provider | CiteSeerX |
|---|---|
| Author | Fox, Armando Gribble, Steven D. Fox, O. |
| Abstract | Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is difficult even without the additional risks posed by wireless media. At the same time, the hardware and software constraints imposed by "small" mobile devices such as PDA's and smart phones are leading to the pervasive use of application-level proxies to mediate between clients and servers. To date, less attention has been focused specifically on securing the connection between the client and an application-level proxy, independently of any particular service. We describe how to provide secure access to application-level proxied services using an indirect protocol called Charon, which leverages the strong protocol and deployed infrastructure of Kerberos IV. Charon partitions the Kerberos client functionality into a very simple client module that does little more than DES encryption, and a Unix-hosted unprivileged proxy module t... |
| File Format | |
| Publisher Date | 1996-01-01 |
| Access Restriction | Open |
| Subject Keyword | Deployed Infrastructure De Encryption Application-level Proxied Service Indirect Authentication Using Kerberos Kerberos Iv Strong Protocol Additional Risk Internet Security Wireless Medium Mobile Computing Pervasive Use Indirect Protocol Small Mobile Device Smart Phone Application-level Proxy Network Computing Particular Service Open Network Secure Access Simple Client Module Kerberos Client Functionality Unix-hosted Unprivileged Proxy Module Software Constraint |
| Content Type | Text |