scispace - formally typeset
Proceedings ArticleDOI

Protecting security information in distributed systems

TLDR
The authors describe and combine data formats for security information based on international standards from several standardization bodies for user authentication, peer-entity authentication and access control in large distributed systems.
Abstract
It is shown how security information for user authentication, peer-entity authentication and access control is created and utilized in large distributed systems. The protection mechanisms used are hash functions, and symmetric and asymmetric cryptography. The authors describe and combine data formats for security information based on international standards from several standardization bodies. >

read more

Citations
More filters
Book ChapterDOI

Addressing Threats and Security Issues in World Wide Web Technology

TL;DR: This work outlines the Web technologies and the related threats within the framework of a Web threat environment and presents a number of security services that can be used for Web transactions categorised according to the Internet layering model.
Book ChapterDOI

Security in Distributed Data Systems

TL;DR: An overview of the background and current situation in the area of distributed data systems in Europe will further link the projects to international standardization and indicate the strategic direction of some of the future work.

The privacy feature of trusted computing technology using the concept of direct anonymous attestation with cloud as a technique

E. Padma, +1 more
TL;DR: The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security by increasing the security feature by the concept of DAA, which provides a balance between signer authentication and privacy.
Proceedings ArticleDOI

Security mechanism for distributed systems

Chang, +2 more
TL;DR: A numeric example and two lemmas reveal the feasibility of the proposed protocol, which is a new authentication protocol in distributed systems that identifies the applicant using his/her qualified key.
Journal ArticleDOI

Trusted Attestation System for Cloud Computing Environment Using Trusted Platform Module

E. Padma, +1 more
TL;DR: In the context of Trusted Attestation System in Cloud Computing Environment the Root of Trust for Attestation plays a vital role for security feature with Trusted Computing.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Proceedings ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI

Timestamps in key distribution protocols

TL;DR: It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.