Literaturverzeichnis

[1]B. Bryant, T. Ts’o. Designing an Authentication System: a Dialogue in Four Scenes, 1988, 1997.

https://web.mit.edu/Kerberos/dialogue.html.

[2]B. Callaghan, B. Pawlowski, P. Staubach. RFC 1813: NFS Version 3 Protocol Specification, 1995.

https://www.ietf.org/rfc/rfc1813.txt.

[3]D. Davis, R. Swick. Workstation Services and Kerberos Authentication at Project Athena, 1989.

ftp://athena-dist.mit.edu/pub/kerberos/doc/user2user.ps.

[4]R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee. RFC 2616: Hypertext Transfer Protocol – HTTP/1.1, 1999.

https://www.ietf.org/rfc/rfc2616.txt.

[5]G. Good. RFC 2849: The LDAP Data Interchange Format (LDIF) – Technical Specification, 2000.

https://www.ietf.org/rfc/rfc2849.txt ...

Get Kerberos, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.