Design of a effective Authorization Mechanism based on Kerberos


The KIPS Transactions:PartC, Vol. 10, No. 3, pp. 287-294, Jun. 2003
10.3745/KIPSTC.2003.10.3.287,   PDF Download:

Abstract

Authentication and authorization are essential functions for the security of distributed network environment. Authorization is determining and to decide whether a user or process is permitted to perform a particular operation. In this paper, we design an authorization mechanism to make a system more effective with Kerberos for authentication mechanism. In the authorization mechanism, Kerberos server operates proxy privilege server. Proxy privilege server manages and permits right of users, servers and services with using proposed algorithm. Also, privilege attribute certificate issued by proxy privilege server is used in delegation. We designed secure kerberos with proposed functions for effective authorization at the same time authentication of Kerberos mechanism.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
E. H. Kim and M. S. Jun, "Design of a effective Authorization Mechanism based on Kerberos," The KIPS Transactions:PartC, vol. 10, no. 3, pp. 287-294, 2003. DOI: 10.3745/KIPSTC.2003.10.3.287.

[ACM Style]
Eun Hwan Kim and Moon Seog Jun. 2003. Design of a effective Authorization Mechanism based on Kerberos. The KIPS Transactions:PartC, 10, 3, (2003), 287-294. DOI: 10.3745/KIPSTC.2003.10.3.287.