Distributed authentication for resource control
| dc.contributor.advisor | Wentworth, Peter | |
| dc.contributor.author | Burdis, Keith Robert | |
| dc.date.accessioned | 2026-03-04T08:22:10Z | |
| dc.date.issued | 2000 | |
| dc.description.abstract | This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with the existing sign-on scenario are that users have too much credential information to manage and are prompted for this information too often. Single Sign-On (SSO) is a viable solution to this problem if physical procedures are introduced to minimise the risks associated with its use. The Generic Security Services API (GSS-API) provides security services in a manner in- dependent of the environment in which these security services are used, encapsulating security functionality and insulating users from changes in security technology. The un- derlying security functionality is provided by GSS-API mechanisms. We developed the Secure Remote Password GSS-API Mechanism (SRPGM) to provide a mechanism that has low infrastructure requirements, is password-based and does not require the use of long-term asymmetric keys. We provide implementations of the Java GSS-API bindings and the LIPKEY and SRPGM GSS-API mechanisms. The Secure Authentication and Security Layer (SASL) provides security to connection- based Internet protocols. After finding deficiencies in existing SASL mechanisms we de- veloped the Secure Remote Password SASL mechanism (SRP-SASL) that provides strong password-based authentication and countermeasures against known attacks, while still be- ing simple and easy to implement. We provide implementations of the Java SASL binding and several SASL mechanisms, including SRP-SASL. | |
| dc.description.degree | Master's thesis | |
| dc.description.degree | MSc | |
| dc.format.extent | 122 pages | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.other | http://hdl.handle.net/10962/d1006512 | |
| dc.identifier.uri | https://researchrepository.ru.ac.za/handle/123456789/5881 | |
| dc.language | English | |
| dc.publisher | Rhodes University, Faculty of Science, Department of Computer Science | |
| dc.subject | Computers -- Access control | |
| dc.subject | Data protection | |
| dc.subject | Computer networks -- Security measures | |
| dc.subject | Electronic data processing departments -- Security measures | |
| dc.title | Distributed authentication for resource control | |
| dc.type | Academic thesis |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Distributed_authentication_for_resource_control_vital_4630.pdf
- Size:
- 591.99 KB
- Format:
- Adobe Portable Document Format