Joining Security Realms: A Single Login for NetWare and Kerberos
dc.contributor.author | Adamson, William A. | en_US |
dc.contributor.author | Rees, Jim | en_US |
dc.contributor.author | Honeyman, Peter | en_US |
dc.date.accessioned | 2014-07-18T18:12:00Z | |
dc.date.available | 2014-07-18T18:12:00Z | |
dc.date.issued | 1995-02-07 | en_US |
dc.identifier.citation | W.A. Adamson, J. Rees, and P. Honeyman, "Joining Security Realms: A Single Login for NetWare and Kerberos," February 1995. [USENIX Security Symposium, Salt Lake City (June 1995).] <http://hdl.handle.net/2027.42/107931> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107931 | |
dc.description.abstract | Accommodating disjoint security realms is a challenge for administrators who have to maintain duplicate data sets and for users who need to recall multiple pass phrases, yet joining security realms together can expose one realm to the weaknesses of the other. In this paper, we compare the Kerberos and NetWare security realms, examine methods of joining the two realms under a single login, and propose an attractive single login design. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Joining Security Realms: A Single Login for NetWare and Kerberos | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107931/1/citi-tr-95-1.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.