Title :
Using Kerberos in operations systems
Author_Institution :
Bellcore, Piscataway, NJ, USA
Abstract :
The author discusses the use of the Kerberos authentication technology in securing operations systems (OSs) interfaces. He begins with a problem description, and discusses the need for a solution. Kerberos is briefly introduced. A feasibility prototype is described which addresses various vulnerabilities in an OS-OS interface where the prototype solution is applicable to a wide range of OSs, and requires little modification to the upstream system, no modification to either downstream system, and little modification to either underlying operating environment. It is concluded that Kerberos is viable for implementing a generic authentication service within a communications subsystem used by many OSs
Keywords :
cryptography; message authentication; operating systems (computers); security of data; Kerberos authentication technology; OS interfaces; communications subsystem; generic authentication service; operations systems; private key cryptography; Authentication; Computer security; Human computer interaction; Information analysis; Information management; Information security; Modems; Operating systems; Protection; Prototypes;
Conference_Titel :
Global Telecommunications Conference, 1991. GLOBECOM '91. 'Countdown to the New Millennium. Featuring a Mini-Theme on: Personal Communications Services
Conference_Location :
Phoenix, AZ
Print_ISBN :
0-87942-697-7
DOI :
10.1109/GLOCOM.1991.188471