Show simple item record

The KX.509 Protocol

dc.contributor.authorDoster, Williamen_US
dc.contributor.authorWatts, Marcusen_US
dc.contributor.authorHyde, Danen_US
dc.date.accessioned2014-07-18T18:11:49Z
dc.date.available2014-07-18T18:11:49Z
dc.date.issued2001-02en_US
dc.identifier.citationWilliam Doster, Marcus Watts, and Dan Hyde "The KX.509 Protocol," February 2001. <http://hdl.handle.net/2027.42/107888>en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/107888
dc.description.abstractThis document describes the KX.509 protocol. Using this protocol, a workstation can acquire a temporary (or ''junk'') X.509 certificate on behalf of a user based on having a kerberos ticket for that user.en_US
dc.publisherCenter for Information Technology Integrationen_US
dc.titleThe KX.509 Protocolen_US
dc.typeTechnical Reporten_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.contributor.affiliationumCenter for Information Technology Integrationen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/107888/1/citi-tr-01-2.pdf
dc.owningcollnameElectrical Engineering and Computer Science, Department of (EECS)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.