fullrecord |
[{"key": "dc.contributor.advisor", "value": "M\u00f6nk\u00f6l\u00e4, Sanna", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Olkinuora, Petteri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2016-03-22T08:32:23Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2016-03-22T08:32:23Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/49151", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Modernit tietoj\u00e4rjestelm\u00e4t ovat siirtyneet keskustietokone-arkkitehtuureista hajautettuun malliin, jossa verkon eri palvelut sijaitsevat eri puolilla tietoverkkoa. Verkon eri palvelut vaativat k\u00e4ytt\u00e4j\u00e4n luotettavaa tunnistamista ja t\u00e4t\u00e4 varten on jo pitk\u00e4\u00e4n kehitetty\nerilaisia hajautettuja k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelmi\u00e4. Kerberos-k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelm\u00e4 on Massachusetts Institute of Technologyss\u00e4 kehitetty hajautettu k\u00e4ytt\u00e4j\u00e4n identiteetin tunnistamiseen kehitetty j\u00e4rjestelm\u00e4, joka on nk. Project Athenan yksi tuotos. Nyky\u00e4\u00e4n mm. Microsoft Windows verkot on rakennettu k\u00e4ytt\u00e4m\u00e4\u00e4n Kerberosta k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelm\u00e4n\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Modern information systems have moved from central computers to a distributed model where different network services are located across the network. Secure network\nservices require user authentication and since the services are distributed across the network user authentication must support this. Kerberos autentication is a distributed user authentication protocoll which was developed in Massachusetts Institute of Technology and Kerberos is one of the results of Project Athena. Nowdays Kerberos is widelly spread because Microsoft Windows Domains use Kerberos as the default user authentication system.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Petteri Olkinuora (topeolki) on 2016-03-22 08:32:22.656535. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2016-03-22T08:32:23Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201603221916.pdf: 128260 bytes, checksum: a720838c1c1010830fd7332f905aee40 (MD5)\nlicense.html: 4793 bytes, checksum: 66f08ade5a3f7df28064b37c5c19f555 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2016-03-22T08:32:23Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201603221916.pdf: 128260 bytes, checksum: a720838c1c1010830fd7332f905aee40 (MD5)\nlicense.html: 4793 bytes, checksum: 66f08ade5a3f7df28064b37c5c19f555 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Kerberos k\u00e4ytt\u00e4j\u00e4tunnistus", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Microsoft Kerberos", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "MIT Kerberos", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kerberos-k\u00e4ytt\u00e4j\u00e4tunnistusj\u00e4rjestelm\u00e4", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201603221916", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2016-03-22T08:32:23Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|