Peter T. Brundrett
Microsoft
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Peter T. Brundrett.
symposium on access control models and technologies | 2001
Michael M. Swift; Peter T. Brundrett; Cliff Van Dyke; Praerit Garg; Anne Hopkins; Shannon J. Chan; Mario C. Goertzel; Gregory Jensenworth
This paper presents the access control mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000. We first extended entries in access control lists to allow rights to apply to just a portion of an object. The second extension allows centralized management of object hierarchies by specifying more precisely how access control lists are inherited. The final extension allows users to limit the rights of executing programs by restricting the set of objects they may access. These changes have the combined effect of allowing centralized management of access control while precisely specifying which accesses are granted to which programs.
Information Security Technical Report | 1998
Peter T. Brundrett
Abstract Enterprise networks using Windows NT are growing in size and complexity. Windows NT 5.0 uses the Kerberos Version 5 authentication protocol and the Active Directory for network security in Windows NT domains. The Windows NT implementation of the Kerberos Version 5 protocol is based on RFC 1510, which has gone through a wide industry review and is well known in the security community [1]. Kerberos authentication provides many features that support performance and security objectives for Enterprise networks. Microsofts implementation will support any RFC 1510-compliant clients, but will be required for full support of Windows NT networks because the Microsoft version includes permitted extensions to the standard. Windows NT 5.0 integrates the Kerberos protocol into the existing Windows NT distributed security model. Windows NT uses the extensibility features of the protocol, as have other security architectures, such as DCE and SESAME [2]. The Kerberos protocol is just one of the security protocols supported in Windows NT 5.0. Others include NTLM for backward compatibility, SSL and the IETF standard Transport Layer Security (TLS) for public-key authentication, Simple Protected Negotiation (SPNEGO) of security mechanisms, and IP security (IPsec) for network layer security using either shared-key or public-key authentication.
Archive | 2001
Peter T. Brundrett; Praerit Garg; Jianrong Gu; James W. Kelly; Keith Stuart Kaplan; Robert P. Reichel; Brian D. Andrew; Gary D. Kimura; Thomas J. Miller
Archive | 1998
Clifford P. Van Dyke; Peter T. Brundrett; Michael M. Swift; Praerit Garg; Richard B. Ward
Archive | 2011
Thekkthalackal Varugis Kurien; Jeffrey B. Hamblin; Narasimha Rao S. S. Nagampalli; Peter T. Brundrett; Scott Field
Archive | 1998
Praerit Garg; Michael M. Swift; Clifford P. Van Dyke; Richard B. Ward; Peter T. Brundrett
Archive | 1998
Praerit Garg; Michael M. Swift; Clifford P. Van Dyke; Richard B. Ward; Peter T. Brundrett
Archive | 2005
Eric C. Perlin; Klaus U. Schutz; Paul J. Leach; Peter T. Brundrett; Thomas C. Jones
Archive | 2005
Roberto A. Franco; Anantha P. Ganjam; John G. Bedworth; Peter T. Brundrett; Roland Tokumi
Archive | 2005
Eric C. Perlin; Klaus U. Schutz; Paul J. Leach; Peter T. Brundrett; Thomas C. Jones