O'Reilly logo

Kerberos by Mark Pröhl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Literaturverzeichnis

[1] Bill Bryant, Theodore Ts’o. Designing an Authentication System: a Dialogue in Four Scenes, 1988, 1997.

http://web.mit.edu/Kerberos/dialogue.html.

[2] B. Callaghan, B. Pawlowski, P. Staubach. RFC 1813: NFS Version 3 Protocol Specification, 1995.

http://www.ietf.org/rfc/rfc1813.txt.

[3] Don Davis, Ralph Swick. Workstation Services and Kerberos Authentication at Project Athena, 1989.

ftp://athena-dist.mit.edu/pub/ATHENA/kerberos/doc/user2user.ps.

[4] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee. RFC 2616: Hypertext Transfer Protocol – HTTP/1.1, 1999.

http://www.ietf.org/rfc/rfc2616.txt.

[5] G. Good. RFC 2849: The LDAP Data Interchange Format (LDIF) – Technical Specification, 2000.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required