DASS - DISTRIBUTED AUTHENTICATION SECURITY SERVICE

被引:0
|
作者
GASSER, M [1 ]
KAUFMAN, C [1 ]
LINN, J [1 ]
LEROUX, Y [1 ]
TARDO, J [1 ]
机构
[1] DIGITAL EQUIPMENT, READING RG2 0TE, ENGLAND
关键词
SECURITY AND PROTECTION; DISTRIBUTED SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a distributed environment, authentication is particularly challenging. This paper will present the authentication service component of the Distributed System Security Architecture (DSSA)1. The Distributed Authentication Security Service DASS has been proposed to Internet as a potential standard2 After positioning the problem, we will explain the choice of the central concepts behind this service: After this conceptual approach, we will present according to the six phases described in the OSI Authentication Framework, a DASS walkthrough.
引用
收藏
页码:447 / 456
页数:10
相关论文
共 50 条
  • [21] Security of Grouping-Proof Authentication Protocol for Distributed RFID Systems
    Sun, Da-Zhi
    Mu, Yi
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 254 - 257
  • [22] The research and design on secure tunnels and security authentication of distributed computing and application
    Lu, JD
    DCABES 2001 PROCEEDINGS, 2001, : 224 - 229
  • [23] An authentication technique based on distributed security management for the global mobility network
    Suzuki, S
    Nakada, K
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1997, 15 (08) : 1608 - 1617
  • [24] An Enhanced Security Authentication Mechanism in the Environment Partially Distributed Mobility Management
    Kim, Dohyun
    Shin, Yongtae
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 457 - 462
  • [25] Security analysis of two anonymous authentication protocols for distributed wireless networks
    Wong, DS
    Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 284 - 288
  • [26] Energy efficient distributed lightweight authentication and encryption technique for IoT security
    Sudhakaran, Pradeep
    Malathy, C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (02)
  • [27] Smart Home Security: A Distributed Identity-based Security Protocol for Authentication and Key Exchange
    Rathore, M. Mazhar
    Bentafat, Elmahdi
    Bakiras, Spiridon
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [28] Design of RFID security authentication protocol for e-commerce service
    School of Computer Science, Sichuan University of Science and Engineering, Zigong Sichuan, China
    不详
    不详
    Metall. Min. Ind., 9 (506-512): : 506 - 512
  • [29] A security authentication scheme in machine-to-machine home network service
    Sun, Xuebin
    Men, Shuang
    Zhao, Chenglin
    Zhou, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2678 - 2686
  • [30] Understanding and mitigating security and authentication issues in service oriented network architecture
    Department of Information Technology, Indian Institute of Information Technology, Allahabad UP
    211 012, India
    Int. J. Secur. Netw., 1 (9-19):