Design of a effective Authorization Mechanism based on Kerberos

KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 3, pp. 287-294, Jun. 2003
10.3745/KIPSTC.2003.10.3.287,   PDF Download:


Authentication and authorization are essential functions for the security of distributed network environment. Authorization is determining and to decide whether a user or process is permitted to perform a particular operation. In this paper, we design an authorization mechanism to make a system more effective with Kerberos for authentication mechanism. In the authorization mechanism, Kerberos server operates proxy privilege server. Proxy privilege server manages and permits right of users, servers and services with using proposed algorithm. Also, privilege attribute certificate issued by proxy privilege server is used in delegation. We designed secure kerberos with proposed functions for effective authorization at the same time authentication of Kerberos mechanism.

Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.

Cite this article
[IEEE Style]
E. H. Kim and M. S. Jun, "Design of a effective Authorization Mechanism based on Kerberos," KIPS Journal C (2001 ~ 2012) , vol. 10, no. 3, pp. 287-294, 2003. DOI: 10.3745/KIPSTC.2003.10.3.287.

[ACM Style]
Eun Hwan Kim and Moon Seog Jun. 2003. Design of a effective Authorization Mechanism based on Kerberos. KIPS Journal C (2001 ~ 2012) , 10, 3, (2003), 287-294. DOI: 10.3745/KIPSTC.2003.10.3.287.