skip to main content
10.1145/236387.236439acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article
Free Access

Security on the move: indirect authentication using Kerberos

Published:01 November 1996Publication History
First page image

References

  1. 1.M. Abrams etal. Caching proxies: limitations and potentials. In Proceedings of the Fourth International World Wide Web Conference, Boston, MA, USA, December 1995.]]Google ScholarGoogle Scholar
  2. 2.E. Anderson. Personal communication, May 1996.]]Google ScholarGoogle Scholar
  3. 3.Apple Computer, Inc. Newton internet enabler. Home page "http://devworld.apple.com/dev/newton/tools/nie.html".]]Google ScholarGoogle Scholar
  4. 4.A. Aziz and W. Diffie. Privacy and authentication for wireless local area networks. IEEE Personal Communications, pages 25-31, First Quarter 1994.]]Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.H. B alakrishnan, S. Seshan, E. Amir, and R. H. Katz. Improving reliable transport and handoff performance in cellular wireless networks. ACM Wireless Networks, vol. 1, no. 4, December 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.S.M. Beilovin. Personal communication, May 1996.]]Google ScholarGoogle Scholar
  7. 7.S.M. Bellovin and M. Memtt. Limitations of the kerberos authentication system. In Proceedings USENIX Winter Conference 1991, Dallas, Texas, USA, 1991.]]Google ScholarGoogle Scholar
  8. 8.C. Mic Bowman et al. The harvest information discovery and access system. In Proceedings of the Second International World Wide Web Conference, pages 763-771, Chicago, Illinois, October 1994.]]Google ScholarGoogle Scholar
  9. 9.Eric A. Brewer et al. The GloMop project (home page). "http://www. cs.berkeley, edu/-fox/glomop".]]Google ScholarGoogle Scholar
  10. 10.C. Brooks, M.S. Mazer, S. Meeks, and J. Miller. Application-specific proxy servers as http stream transducers. In Proceedings of the Fourth International World Wide Web Conference, December 1995.]]Google ScholarGoogle Scholar
  11. 11.D. Brown. Techniques for privacy and authentication in personal communication systems. IEEE Personal Communications, August 1995.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. 12.M. Burrows, M. Abadi, and R. Needham. A logic of authentication. A CM Transactions on Computer Systems, 8(1): 18-36, February 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional Computing Series. Addison-Wesley, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.D. Cox. Wireless personal communications: What is it? IEEE Personal Communications, pages 20-35, April 1995.]]Google ScholarGoogle ScholarCross RefCross Ref
  15. 15.B. Doster and J. Rees. Third party authentication in the institutional file system. CITI Technical Report 92-1, Center for Information Technology Integration, University of Michigan, February 1992.]]Google ScholarGoogle Scholar
  16. 16.A. Fox and E.A. Brewer. Reducing WWW latency and bandwidth requirements via real-time distillation. In Proceedings of the Fifth International Worm Wide Web Conference, Paris, France, May 1996. World Wide Web Consortium.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.A. Fox, S. Gribble, E. Brewer, and E. Amir. Adapting to network and client variability via on-demand dynamic distillation. In Proceedings of the Seventh International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS- VII), Cambridge, MA, October 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.Y. Frankel et al. Security issues in a cdpd wireless network. IEEE Personal Communications, 2(4): 16-27, August 1995.]]Google ScholarGoogle ScholarCross RefCross Ref
  19. 19.Geos operating system for PDA's (home page). "http:// www. geoworks.com/htmpages/sso.htm".]]Google ScholarGoogle Scholar
  20. 20.Geoworks and Nokia. Nokia 9000 communicator (home page). "http://www. geoworks.com/htmpages/9000.htm".]]Google ScholarGoogle Scholar
  21. 21.l. Goldberg, D. Wagner, E.A. Brewer, and P. Gauthier. Basic flaws in internet security and commerce. "http:// www. cs.berkeley.edu/~gauthier/endpoint-security, html".]]Google ScholarGoogle Scholar
  22. 22.S. Gribble. Real-time streams to PDA's. "http:// www. cs.berkeley.edu/~gribble/cs294- 3_multimedia/proj ect/ project.html".]]Google ScholarGoogle Scholar
  23. 23.T. R. Halfhill. inside the web pc. Byte Magazine, pages 44-- 56, March 1996.]]Google ScholarGoogle Scholar
  24. 24.IBM Corporation. IBM ARTour publications page. "http:// www. raleigh.ibm.com/art/artpub, htm".]]Google ScholarGoogle Scholar
  25. 25.J. Ioannidis, D. Duchamp, and G. Maguire, Jr. IP-based protocols for mobile internetworking. In Proceedings of SIGCOMM '91, pages 235-245, Zurich, Switzerland, September 199 I.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.ITU-T Recommendation v.42. International Telecommunication Union, March 93.]]Google ScholarGoogle Scholar
  27. 27.H. Jerome and J. Saltzer. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278- 1308, September 1975.]]Google ScholarGoogle ScholarCross RefCross Ref
  28. 28.A. D. Joseph et al. Rover: A toolkit for mobile information access. In Proceedings of the Fifteenth Symposium on Operating Systems Principles, Copper Mountain Resort, Colorado, December 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29.R. H. Katz et al. The daedalus project (home page). "http:// daedalus.cs.berkeley, edu".]]Google ScholarGoogle Scholar
  30. 30.J. Kohl and C. Neuman. The kerberos network authentication service (V5). Request for Comments (RFC) 1510, September 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. 31.M. Liljeberg et al. Enhanced services for world wide web in mobile WAN environment. University of Helsinki CS Technical Report No. C-1996-28, April 1996.]]Google ScholarGoogle Scholar
  32. 32.National Bureau of Standards. Data encryption standard. Technical Report Publication 46, Federal Information Processing Standards, 1977.]]Google ScholarGoogle Scholar
  33. 33.R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. CA CM, 21 ( 12):993-999, December 1978.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34.Netscape Communications Corporation. The netscape proxy server (home page). "http://www. pinncomp.com/netscape/ proxy_server, html".]]Google ScholarGoogle Scholar
  35. 35.B.D. Noble, M. Price, and M. Satyanarayanan. A programming interface for application-aware adaptation in mobile computing. Proceedings of the Second USENIX Symposium on Mobile and Location-Independent Computing, Ann Arbor, MI, USA, April 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. 36.Ray Rischpater. Using magic cap's TCP/IP stack. PDA Developers 4.2, March/April 1996.]]Google ScholarGoogle Scholar
  37. 37.J. Romkey. A nonstandard for the transmission of ip datagrams over serial lines: SLIP. Request for Comments (RFC) 1055, June 1988.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. 38.J. H. Saltzer, D.P. Reed, and D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, vol. 2, no. 4, November 1984.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. 39.W. Simpson, Ed. The point-to-point protocol (PPP). Request for Comments (RFC) 1661, July 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. 40.J.G. Steiner, C. Neuman, and J.I. Schiller. Kerberos: an authentication service for open network systems. In Proceedings USENIX Winter Conference 1988, pages 191- 202, Dallas, Texas, USA, February 1988.]]Google ScholarGoogle Scholar
  41. 41.Sony Corporation. Sony Magic Link PDA (home page). "http://www. sel.sony, conffSELJMagic/".]]Google ScholarGoogle Scholar
  42. 42.Sun Labs. The java language: A white paper. Available at "http://java. sun.com".]]Google ScholarGoogle Scholar
  43. 43.L. Wall and R. L. Schwartz. Programming perl. O'Reilly & Associates, Inc., 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. 44.World-Wide Web Consortium Security Group. A presentation on incorpating kerberos authentication into HTrP. Available at "http://www. ncsa.uiuc.edu/ InformationServer~adanVw3c/KRB 1 .HTM".]]Google ScholarGoogle Scholar
  45. 45.K.-P. Yee. Shoduoka mediator service. "http://www. lfw.org/ shodouka".]]Google ScholarGoogle Scholar
  46. 46.B. Zenel. A proxy based filtering mechanism for the mobile environment. Thesis Proposal, March 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security on the move: indirect authentication using Kerberos

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MobiCom '96: Proceedings of the 2nd annual international conference on Mobile computing and networking
              November 1996
              197 pages
              ISBN:089791872X
              DOI:10.1145/236387

              Copyright © 1996 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 November 1996

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              MobiCom '96 Paper Acceptance Rate18of90submissions,20%Overall Acceptance Rate440of2,972submissions,15%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader