Unclogging distributed computing
IEEE Spectrum
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Role-Based Access Control Models
Computer
NT 4 Network Security
A Review of the SESAME Development
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
How Role Based Access Control is Implemented in SESAME
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
SESAME V2 public key and authorisation extensions to Kerberos
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
II: Security architectures: Generic interface to security services
Computer Communications
III: Security applications: SESAME: The solution to security for open distributed systems
Computer Communications
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Research and Realization of Authentication Technique Based on OTP and Kerberos
HPCASIA '05 Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
Hi-index | 0.24 |
There are a number of proposed solutions to solve the Intranet authorization problem. They fall into two categories: architectures for providing an authorization framework, and generic authorization application programmer interfaces (APIs) for allowing applications access to the authorization services. This paper examines the leading initiatives in these areas: DCE, SESAME and Windows2000 as authorization frameworks and the GSS-API, GAA-API and AZN-API. The paper stresses the important issues related to implementing an authorization service.