skip to main content
RFC1508: Generic Security Service Application Program Interface1993 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 September 1993
Bibliometrics
Skip Abstract Section
Abstract

This Generic Security Service Application Program Interface (GSS-API) definition provides security services to callers in a generic fashion, supportable with a range of underlying mechanisms and technologies and hence allowing source-level portability of applications to different environments. This specification defines GSS-API services and primitives at a level independent of underlying mechanism and programming language environment, and is to be complemented by other, related specifications:

RFC Downloads

Cited By

  1. ACM
    Calegari P, Levrier M and Balczyński P (2019). Web Portals for High-performance Computing, ACM Transactions on the Web, 13:1, (1-36), Online publication date: 28-Feb-2019.
  2. Asteasuain F and Braberman V (2017). Declaratively building behavior by means of scenario clauses, Requirements Engineering, 22:2, (239-274), Online publication date: 1-Jun-2017.
  3. de Caso G, Braberman V, Garbervetsky D and Uchitel S Validation of contracts using enabledness preserving finite state abstractions Proceedings of the 31st International Conference on Software Engineering, (452-462)
  4. ACM
    El-Khatib K The cost of protecting privacy in multimedia applications Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, (51-54)
  5. ACM
    Miltchev S, Smith J, Prevelakis V, Keromytis A and Ioannidis S (2008). Decentralized access control in distributed file systems, ACM Computing Surveys, 40:3, (1-30), Online publication date: 1-Aug-2008.
  6. ACM
    Zhao M and Figueiredo R A user-level secure grid file system Proceedings of the 2007 ACM/IEEE conference on Supercomputing, (1-11)
  7. ACM
    Kher V and Kim Y Securing distributed storage Proceedings of the 2005 ACM workshop on Storage security and survivability, (9-25)
  8. ACM
    Irvine C and Levin T Quality of security service Proceedings of the 2000 workshop on New security paradigms, (91-99)
  9. Krannig A Towards web security using PLASMA Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (14-14)
  10. Hassler V, Lutz N and Posch R Privacy-enhanced desktop meeting system Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
  11. Hollander I, Rajaram P and Tanno C Kerberos on wall street Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (11-11)
  12. Eisler M, Schemers R and Srinivasan R Security mechanism independence in ONC RPC Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (6-6)
  13. ACM
    Samar V Unified login with pluggable authentication modules (PAM) Proceedings of the 3rd ACM conference on Computer and communications security, (1-10)
  14. Zúquete A and Guedes P (1996). Transparent Authentication and Confidentiality for Stream Sockets, IEEE Micro, 16:3, (34-41), Online publication date: 1-Jun-1996.
  15. Kim G, Orman H and O'Malley S Implementing a secure rlogin environment Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (7-7)
  16. Woo T, Bindignavle R, Su S and Lam S SNP Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (4-4)
Contributors

Recommendations