Font Size: a A A

The Safe Model Reaearch Based On The Kerberos For The Lnternal Computer Network

Posted on:2002-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:C G JinFull Text:PDF
GTID:2168360032453055Subject:Analogue recognition and intelligent control
Abstract/Summary:PDF Full Text Request
Based on the information security technology of the computer network, this paper deals with its technological drawbacks and danger tendency. Though methods are given as for how to counterattack the attacks from the external network, it lays emphasis on the measures of counteracting the attacks from the internal network.. Depending on Kerberos, the trusted's three parities protocol, which is developed by MIT, it puts forwards and tries setting a safe and reliable internal network security model, of which ground is the authentication system technology in an open network environment. Not only is the model capable of providing an intensity authentication relying on secret key encryption, but also the AS and TGS is set up to control and govern the user's identity and visiting privilege, thereby enhancing the safety of the information data in the internal network. Also detailed research results are presented to the cross-realm operation between these two internal networks for the purpose of furthering the application field of the security model in the computer network.
Keywords/Search Tags:Computer network, Information Security, Kerberos protocol
PDF Full Text Request
Related items