DASS - DISTRIBUTED AUTHENTICATION SECURITY SERVICE

被引:0
|
作者
GASSER, M [1 ]
KAUFMAN, C [1 ]
LINN, J [1 ]
LEROUX, Y [1 ]
TARDO, J [1 ]
机构
[1] DIGITAL EQUIPMENT, READING RG2 0TE, ENGLAND
关键词
SECURITY AND PROTECTION; DISTRIBUTED SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a distributed environment, authentication is particularly challenging. This paper will present the authentication service component of the Distributed System Security Architecture (DSSA)1. The Distributed Authentication Security Service DASS has been proposed to Internet as a potential standard2 After positioning the problem, we will explain the choice of the central concepts behind this service: After this conceptual approach, we will present according to the six phases described in the OSI Authentication Framework, a DASS walkthrough.
引用
收藏
页码:447 / 456
页数:10
相关论文
共 50 条
  • [31] Bundle authentication and authorization using XML security in the OSGi service platform
    Lim, HY
    Kim, YG
    Moon, CJ
    Baik, DK
    Fourth Annual ACIS International Conference on Computer and Information Science, Proceedings, 2005, : 502 - 507
  • [32] Information Security and Distributed Denial of Service Attacks: A Survey
    Aldaej, Abdulaziz
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2017, : 685 - 690
  • [33] Distributed Service Control Technique for Detecting Security Attacks
    Tupakula, Udaya
    Varadharajan, Vijay
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 574 - 577
  • [34] Peer-to-peer authentication with a distributed single sign-on service
    Josephson, WK
    Sirer, EG
    Schneider, FB
    PEER-TO-PEER SYSTEMS III, 2004, 3279 : 250 - 258
  • [35] A Secured Distributed OCR System in a Pervasive Environment with Authentication as a Service in the Cloud
    Hassen, Hamdi
    Khemakhem, Maher
    2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, : 1200 - 1205
  • [36] Distributed multi level security token based authentication for ubiquitous objects - DMSA
    Kulkarni, U. P.
    Vadavi, J. V.
    Joshi, S. M.
    Sekaran, K. Chandra
    Yardi, A. R.
    2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 50 - +
  • [37] Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems
    Wang, Siye
    Zhu, Shaoyi
    Zhang, Yanfang
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 74 - 77
  • [38] Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protocols
    Muhammad, Shahabuddin
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 214 - 228
  • [39] Security Analysis of a Delegation-Based Authentication Protocol for Wireless Roaming Service
    Kim, Mijin
    Park, Namje
    Won, Dongho
    MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2014, 308 : 445 - 450
  • [40] A modern service-oriented extensible security authentication model based on company
    Yang J.
    Wang D.-Y.
    Yu X.-M.
    Song J.-D.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 1): : 107 - 111