Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peter T. Brundrett is active.

Publication


Featured researches published by Peter T. Brundrett.


symposium on access control models and technologies | 2001

Improving the granularity of access control in Windows NT

Michael M. Swift; Peter T. Brundrett; Cliff Van Dyke; Praerit Garg; Anne Hopkins; Shannon J. Chan; Mario C. Goertzel; Gregory Jensenworth

This paper presents the access control mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000. We first extended entries in access control lists to allow rights to apply to just a portion of an object. The second extension allows centralized management of object hierarchies by specifying more precisely how access control lists are inherited. The final extension allows users to limit the rights of executing programs by restricting the set of objects they may access. These changes have the combined effect of allowing centralized management of access control while precisely specifying which accesses are granted to which programs.


Information Security Technical Report | 1998

Kerberos authentication in Windows NT 5.0 domains

Peter T. Brundrett

Abstract Enterprise networks using Windows NT are growing in size and complexity. Windows NT 5.0 uses the Kerberos Version 5 authentication protocol and the Active Directory for network security in Windows NT domains. The Windows NT implementation of the Kerberos Version 5 protocol is based on RFC 1510, which has gone through a wide industry review and is well known in the security community [1]. Kerberos authentication provides many features that support performance and security objectives for Enterprise networks. Microsofts implementation will support any RFC 1510-compliant clients, but will be required for full support of Windows NT networks because the Microsoft version includes permitted extensions to the standard. Windows NT 5.0 integrates the Kerberos protocol into the existing Windows NT distributed security model. Windows NT uses the extensibility features of the protocol, as have other security architectures, such as DCE and SESAME [2]. The Kerberos protocol is just one of the security protocols supported in Windows NT 5.0. Others include NTLM for backward compatibility, SSL and the IETF standard Transport Layer Security (TLS) for public-key authentication, Simple Protected Negotiation (SPNEGO) of security mechanisms, and IP security (IPsec) for network layer security using either shared-key or public-key authentication.


Archive | 2001

Encrypting file system and method

Peter T. Brundrett; Praerit Garg; Jianrong Gu; James W. Kelly; Keith Stuart Kaplan; Robert P. Reichel; Brian D. Andrew; Gary D. Kimura; Thomas J. Miller


Archive | 1998

Extensible security system and method for controlling access to objects in a computing environment

Clifford P. Van Dyke; Peter T. Brundrett; Michael M. Swift; Praerit Garg; Richard B. Ward


Archive | 2011

Integrating security protection tools with computer device integrity and privacy policy

Thekkthalackal Varugis Kurien; Jeffrey B. Hamblin; Narasimha Rao S. S. Nagampalli; Peter T. Brundrett; Scott Field


Archive | 1998

Per property access control mechanism

Praerit Garg; Michael M. Swift; Clifford P. Van Dyke; Richard B. Ward; Peter T. Brundrett


Archive | 1998

Object type specific access control

Praerit Garg; Michael M. Swift; Clifford P. Van Dyke; Richard B. Ward; Peter T. Brundrett


Archive | 2005

Controlling computer applications' access to data

Eric C. Perlin; Klaus U. Schutz; Paul J. Leach; Peter T. Brundrett; Thomas C. Jones


Archive | 2005

Running internet applications with low rights

Roberto A. Franco; Anantha P. Ganjam; John G. Bedworth; Peter T. Brundrett; Roland Tokumi


Archive | 2005

Controlling execution of computer applications

Eric C. Perlin; Klaus U. Schutz; Paul J. Leach; Peter T. Brundrett; Thomas C. Jones

Collaboration


Dive into the Peter T. Brundrett's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael M. Swift

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge