Skip Abstract Section
Abstract
This Generic Security Service Application Program Interface (GSS-API) definition provides security services to callers in a generic fashion, supportable with a range of underlying mechanisms and technologies and hence allowing source-level portability of applications to different environments. This specification defines GSS-API services and primitives at a level independent of underlying mechanism and programming language environment, and is to be complemented by other, related specifications:
RFC Downloads
ZIP
Cited By
- Calegari P, Levrier M and Balczyński P (2019). Web Portals for High-performance Computing, ACM Transactions on the Web, 13:1, (1-36), Online publication date: 28-Feb-2019.
- Asteasuain F and Braberman V (2017). Declaratively building behavior by means of scenario clauses, Requirements Engineering, 22:2, (239-274), Online publication date: 1-Jun-2017.
- de Caso G, Braberman V, Garbervetsky D and Uchitel S Validation of contracts using enabledness preserving finite state abstractions Proceedings of the 31st International Conference on Software Engineering, (452-462)
- El-Khatib K The cost of protecting privacy in multimedia applications Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, (51-54)
- Miltchev S, Smith J, Prevelakis V, Keromytis A and Ioannidis S (2008). Decentralized access control in distributed file systems, ACM Computing Surveys, 40:3, (1-30), Online publication date: 1-Aug-2008.
- Zhao M and Figueiredo R A user-level secure grid file system Proceedings of the 2007 ACM/IEEE conference on Supercomputing, (1-11)
- Kher V and Kim Y Securing distributed storage Proceedings of the 2005 ACM workshop on Storage security and survivability, (9-25)
- Irvine C and Levin T Quality of security service Proceedings of the 2000 workshop on New security paradigms, (91-99)
- Krannig A Towards web security using PLASMA Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (14-14)
- Hassler V, Lutz N and Posch R Privacy-enhanced desktop meeting system Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
- Hollander I, Rajaram P and Tanno C Kerberos on wall street Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (11-11)
- Eisler M, Schemers R and Srinivasan R Security mechanism independence in ONC RPC Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (6-6)
- Samar V Unified login with pluggable authentication modules (PAM) Proceedings of the 3rd ACM conference on Computer and communications security, (1-10)
- Zúquete A and Guedes P (1996). Transparent Authentication and Confidentiality for Stream Sockets, IEEE Micro, 16:3, (34-41), Online publication date: 1-Jun-1996.
- Kim G, Orman H and O'Malley S Implementing a secure rlogin environment Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (7-7)
- Woo T, Bindignavle R, Su S and Lam S SNP Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (4-4)