[3350] in Kerberos

home help back first fref pref prev next nref lref last post

Re: supposition in kerberization

daemon@ATHENA.MIT.EDU (Jonathan I. Kamens)
Mon May 30 14:16:16 1994

To: kerberos@MIT.EDU
Date: 30 May 1994 18:02:55 GMT
From: jik@cam.ov.com (Jonathan I. Kamens)

I recommend this paper:

Kamens, Jonathan, "Retrofitting network security to third-party applications
--- the SecureBase experience".  Proceedings of the UNIX Security Symposium
IV, Santa Clara, California, 1993.

Yeah, so I wrote it.... So what :-).

Seriously, it talks about our efforts to put a "shell" around SYBASE clients
and servers to do Kerberos authentication.  You might find it useful.

-- 
Jonathan Kamens  |  OpenVision Technologies, Inc.  |   jik@cam.ov.com

home help back first fref pref prev next nref lref last post