Unix Security & Kerberos.
Bart De DeckerPublished in: Computer Security and Industrial Cryptography (1991)
Keyphrases
- security analysis
- authentication protocol
- authentication mechanism
- information security
- security requirements
- intrusion detection
- operating system
- access control
- security policies
- network security
- mutual authentication
- data security
- public key cryptosystem
- security systems
- security mechanisms
- key distribution
- user authentication
- security problems
- security issues
- computer security
- database security
- security properties
- data encryption
- statistical databases
- user friendly
- data integrity
- authentication scheme