blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
11. References Connected: An Internet Encyclopedia
11. References

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1510
Prev: 10. Acknowledgments
Next: 12. Security Considerations

11. References

11. References

   [1]  Miller, S., Neuman, C., Schiller, J., and  J. Saltzer, "Section
        E.2.1: Kerberos  Authentication and Authorization System",
        M.I.T. Project Athena, Cambridge, Massachusetts, December 21,
        1987.

   [2]  Steiner, J., Neuman, C., and J. Schiller, "Kerberos: An
        Authentication Service for Open Network Systems", pp. 191-202 in
        Usenix Conference Proceedings, Dallas, Texas, February, 1988.

   [3]  Needham, R., and M. Schroeder, "Using Encryption for
        Authentication in Large Networks of Computers", Communications
        of the ACM, Vol. 21 (12), pp. 993-999, December 1978.

   [4]  Denning, D., and G. Sacco, "Time stamps in Key Distribution
        Protocols", Communications of the ACM, Vol. 24 (8), pp. 533-536,
        August 1981.

   [5]  Kohl, J., Neuman, C., and T. Ts'o, "The Evolution of the
        Kerberos Authentication Service", in an IEEE Computer Society
        Text soon to be published, June 1992.

   [6]  Davis, D., and R. Swick, "Workstation Services and Kerberos
        Authentication at Project Athena", Technical Memorandum TM-424,
        MIT Laboratory for Computer Science, February 1990.

   [7]  Levine, P., Gretzinger, M, Diaz, J., Sommerfeld, W., and K.
        Raeburn, "Section E.1: Service Management System, M.I.T.
        Project Athena, Cambridge, Mas sachusetts (1987).

   [8]  CCITT, Recommendation X.509: The Directory Authentication
        Framework, December 1988.

   [9]  Neuman, C., "Proxy-Based Authorization and Accounting for
        Distributed Systems," in Proceedings of the 13th International
        Conference on Distributed Computing Systems", Pittsburgh, PA,
        May 1993.

   [10] Pato, J., "Using Pre-Authentication to Avoid Password Guessing
        Attacks", Open Software Foundation DCE Request for Comments 26,
        December 1992.

   [11] National Bureau of Standards, U.S. Department of Commerce, "Data
        Encryption Standard", Federal Information Processing Standards
        Publication 46, Washington, DC (1977).

   [12] National Bureau of Standards, U.S. Department of Commerce, "DES
        Modes of Operation", Federal Information Processing Standards
        Publication 81, Springfield, VA, December 1980.

   [13] Stubblebine S., and V. Gligor, "On Message Integrity in
        Cryptographic Protocols", in Proceedings of the IEEE Symposium
        on Research in Security and Privacy, Oakland, California, May
        1992.

   [14] International Organization for Standardization, "ISO Information
        Processing Systems - Data Communication High-Level Data Link
        Control Procedure - Frame Structure", IS 3309, October 1984, 3rd
        Edition.

   [15] Rivest, R., "The MD4 Message Digest Algorithm", RFC 1320, MIT
        Laboratory for Computer Science, April 1992.

   [16] Rivest, R., "The MD5 Message Digest Algorithm", RFC 1321, MIT
        Laboratory for Computer Science, April 1992.

   [17] Bellovin S., and M. Merritt, "Limitations of the Kerberos
        Authentication System", Computer Communications Review, Vol.
        20(5), pp. 119-132, October 1990.


Next: 12. Security Considerations

Connected: An Internet Encyclopedia
11. References

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609