USING KERBEROS TO SECURE TLS PROTOCOL

被引:0
|
作者
Raluca, Catargiu [1 ]
Monica, Borda [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Commun, Cluj Napoca, Romania
关键词
component; TLS protocol; Kerberos protocol;
D O I
10.1109/ISETC.2010.5679334
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is a survey on how the Kerberos V5 can be transported over TLS protocol in order to provide additional security features. This document describes an extensibility mechanism for Kerberos V5 protocol which improve the security in TLS protocol.
引用
收藏
页码:237 / 240
页数:4
相关论文
共 50 条
  • [1] TLS PROTOCOL: SECURE PROTOCOL WITH CLIENT PUZZLES
    Raluca, Catargiu
    Monica, Borda
    [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 149 - 152
  • [2] Enabling VPN and secure remote access using TLS protocol
    Badra, Mohamad
    Hajjeh, Ibrahim
    [J]. WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 308 - +
  • [3] Secure Authentication Using Biometric Templates in Kerberos
    Maheshwari, Radhika
    Gupta, Apoorva
    Chandra, Nidhi
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1247 - 1250
  • [4] DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things
    Chen, Jiahui
    Xiao, Hang
    Zheng, Yushan
    Hassan, Mohammad Mehedi
    Ianni, Michele
    Guzzo, Antonella
    Fortino, Giancarlo
    [J]. INTERNET OF THINGS, 2023, 23
  • [5] On Using TLS to Secure In-Vehicle Networks
    Zelle, Daniel
    Krauss, Christoph
    Strauss, Hubert
    Schmidt, Karsten
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [6] Safe and Secure Communication Using SSL/TLS
    Kumar, Darapureddy Devendra
    Mukharzee, Jerripothula Desai
    Reddy, Chirla Vijay Durga
    Rajagopal, Shinu M.
    [J]. 2024 International Conference on Emerging Smart Computing and Informatics, ESCI 2024, 2024,
  • [7] TLS Protocol: Improvement Using Proxies
    David, Raluca
    Borda, Monica
    [J]. 2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 151 - 154
  • [8] EMV-TLS, a Secure Payment Protocol For NFC Enabled Mobiles
    Urien, Pascal
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 203 - 210
  • [9] A Secure Framework to Authenticate Remotely Digital Documents based on The TLS Protocol
    Lopez Pimentel, Juan C.
    Ibarra Orozco, Rodolfo E.
    Fon Bon, Victor F. Ramos
    Monroy, Rail
    [J]. WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 1264 - +
  • [10] Security Analysis of the Kerberos protocol using BAN logic
    Fan, Kai
    Li, Hui
    Wang, Yue
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 467 - +