Article ID: CBB051933073

On the Origin of Kerberos (January-March 2021)

unapi

Jerome H. Saltzer (Author)


IEEE Annals of the History of Computing
Volume: 43
Issue: 1
Pages: 89-91


Publication Date: January-March 2021
Edition Details: Anecdotes
Language: English

Reports on the special features and applications supported by Kerberos, a cryptographic authentication and key distribution system developed by MIT Project Athena with the goal that a single login provide access to many different computing services. Kerberos is distributed as a component of most major operating systems, including Microsoft Windows, Apple OS/X and IOS, IBM z/OS, and many versions of Unix.

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB051933073/

Similar Citations

Book Lennon, Brian; (2018)
Passwords: philology, security, authentication (/isis/citation/CBB427866448/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Article Emilio Matricciani; Tullia Norando; Paola Magnaghi Delfino; (2013)
How did Polybius perfect Cleoxenus and Democleitus signalling method, 2200 years ago? (/isis/citation/CBB345497918/)

Book Cécile Michel; Michael Friedrich; (2020)
Fakes and Forgeries of Written Artefacts from Ancient Mesopotamia to Modern China (/isis/citation/CBB397878352/)

Article Jérôme Baudry; Élise Tancoigne; Bruno J Strasser; (June 2022)
Turning crowds into communities: The collectives of online citizen science (/isis/citation/CBB205266249/)

Book Luca Zamparo; Monica Salvadori; Elisa Bernard; Monica Baggio; (2019)
Anthropology of Forgery: A Multidisciplinary Approach to the Study of Archaeological Fakes (/isis/citation/CBB719395081/)

Article Thomas Haigh; Mark Priestley; (July 2020)
Contextualizing Colossus: Codebreaking Technology and Institutional Capabilities (/isis/citation/CBB455159316/)

Book Paolo Bonavoglia; (2023)
La crittografia della Repubblica di Venezia (/isis/citation/CBB820423644/)

Book Andrew Hodges; Douglas Hofstadter; (2014)
Alan Turing: The Enigma: The Book That Inspired the Film "The Imitation Game" (/isis/citation/CBB485951446/)

Article Nicholas Paul Sheppard; (March 2020)
Can Smart Contracts Learn from Digital Rights Management? (/isis/citation/CBB343046132/)

Article Sarah Myers West; (June 2022)
Cryptography as information control (/isis/citation/CBB869396949/)

Article Foley, Jillian; (March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations (/isis/citation/CBB627277329/)

Article Vijay Sivaraman; Hassan Habibi Gharakheili; Clinton Fernandes; Narelle Clark; Tanya Karliychuk; (June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications (/isis/citation/CBB353680957/)

Book Wylie, Francis E.; (1975)
M.I.T. in perspective: A pictorial history of the Massachusetts Institute of Technology (/isis/citation/CBB000015321/)

Book Massachusetts Institute of Technology, ; (1988)
Selective guide to the collections (/isis/citation/CBB000060922/)

Authors & Contributors
Hassan Habibi Gharakheili
Luca Zamparo
Norando, Tullia
Monica Baggio
Matricciani, Emilio
Baudry, Jerome
Concepts
Cryptography
Computers and computing
Authentication
Computer security; cyber security
Data encryption
Privacy
Time Periods
21st century
20th century
Early modern
Medieval
Republic of Venice (697–1797)
Modern
Places
United States
Bletchley Park
Greece
Great Britain
Institutions
Massachusetts Institute of Technology, MIT
Ethereum
United States. National Security Agency
Oxford University
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment