Literaturverzeichnis

[1] Bill Bryant, Theodore Ts’o. Designing an Authentication System: a Dialogue in Four Scenes, 1988, 1997.

http://web.mit.edu/Kerberos/dialogue.html.

[2] B. Callaghan, B. Pawlowski, P. Staubach. RFC 1813: NFS Version 3 Protocol Specification, 1995.

http://www.ietf.org/rfc/rfc1813.txt.

[3] Don Davis, Ralph Swick. Workstation Services and Kerberos Authentication at Project Athena, 1989.

ftp://athena-dist.mit.edu/pub/ATHENA/kerberos/doc/user2user.ps.

[4] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee. RFC 2616: Hypertext Transfer Protocol – HTTP/1.1, 1999.

http://www.ietf.org/rfc/rfc2616.txt.

[5] G. Good. RFC 2849: The LDAP Data Interchange Format (LDIF) – Technical Specification, 2000.

Get Kerberos now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.