The KX.509 Protocol
dc.contributor.author | Doster, William | en_US |
dc.contributor.author | Watts, Marcus | en_US |
dc.contributor.author | Hyde, Dan | en_US |
dc.date.accessioned | 2014-07-18T18:11:49Z | |
dc.date.available | 2014-07-18T18:11:49Z | |
dc.date.issued | 2001-02 | en_US |
dc.identifier.citation | William Doster, Marcus Watts, and Dan Hyde "The KX.509 Protocol," February 2001. <http://hdl.handle.net/2027.42/107888> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107888 | |
dc.description.abstract | This document describes the KX.509 protocol. Using this protocol, a workstation can acquire a temporary (or ''junk'') X.509 certificate on behalf of a user based on having a kerberos ticket for that user. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | The KX.509 Protocol | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107888/1/citi-tr-01-2.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.