Abstract
Applications that want to take full advantage of the benefits of the Kerberos or SESAME architecture, need to be Kerberized or sesamized. This Chapter describes in some detail how applications can be sesamized [6, 7, 9].
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Ashley, P., Vandenwauver, M. (1999). Securing Applications with the GSS-API. In: Practical Intranet Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-5609-1_7
Download citation
DOI: https://doi.org/10.1007/978-1-4615-5609-1_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-7566-1
Online ISBN: 978-1-4615-5609-1
eBook Packages: Springer Book Archive