Abstract
Chapters 5 and 6 reviewed the Kerberos and SESAME security architectures. In this chapter other important security architectures are reviewed. They are classified as architectures because similarly to Kerberos and SESAME they provide an infrastructure to secure a networked environment. The infrastructure may include components such as on-line security servers, off-line security servers, security APIs, etc. The architectures included in this chapter are Yaksha, KryptoKnight, DCE, DSSA and DASS/SPX.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Ashley, P., Vandenwauver, M. (1999). Security Architectures. In: Practical Intranet Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-5609-1_8
Download citation
DOI: https://doi.org/10.1007/978-1-4615-5609-1_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-7566-1
Online ISBN: 978-1-4615-5609-1
eBook Packages: Springer Book Archive