Cryptography and Network Security (4th Edition)

[Page 430 (continued)]

14.4. Recommended Reading and Web Sites

A painless way to get a grasp of Kerberos concepts is found in [BRYA88]. One of the best treatments of Kerberos is [KOHL94]. [TUNG99] describes Kerberos from a user's point of view.

[PERL99] reviews various trust models that can be used in a PKI. [GUTM02] highlights difficulties in PKI use and recommends approaches for an effective PKI.


[Page 431]

BRYA88 Bryant, W. Designing an Authentication System: A Dialogue in Four Scenes. Project Athena document, February 1988. Available at http://web.mit.edu/kerberos/www/dialogue.html.

GUTM02 Gutmann, P. "PKI: It's Not Dead, Just Resting." Computer, August 2002.

KOHL94 Kohl, J.; Neuman, B.; and Ts'o, T. "The Evolution of the Kerberos Authentication Service." in Brazier, F., and Johansen, D. Distributed Open Systems. Los Alamitos, CA: IEEE Computer Society Press, 1994. Available at http://web.mit.edu/kerberos/www/papers.html.

PERL99 Perlman, R. "An Overview of PKI Trust Models." IEEE Network, November/December 1999.

TUNG99 Tung, B. Kerberos: A Network Authentication System. Reading, MA: Addison-Wesley, 1999.

Recommended Web Sites

  • MIT Kerberos Site: Information about Kerberos, including the FAQ, papers and documents, and pointers to commercial product sites

  • USC/ISI Kerberos Page: Another good source of Kerberos material

  • Kerberos Working Group: IETF group developing standards based on Kerberos

  • Public-Key Infrastructure Working Group: IETF group developing standards based on X.509v3

  • Verisign: A leading commercial vendor of X.509-related products; white papers and other worthwhile material at this site

  • NIST PKI Program: Good source of information

Категории