Proceedings ArticleDOI
Protecting security information in distributed systems
C. Fritzner,L. Nilsen,A. Skomedal +2 more
- pp 245-254
TLDR
The authors describe and combine data formats for security information based on international standards from several standardization bodies for user authentication, peer-entity authentication and access control in large distributed systems.Abstract:
It is shown how security information for user authentication, peer-entity authentication and access control is created and utilized in large distributed systems. The protection mechanisms used are hash functions, and symmetric and asymmetric cryptography. The authors describe and combine data formats for security information based on international standards from several standardization bodies. >read more
Citations
More filters
Book ChapterDOI
Addressing Threats and Security Issues in World Wide Web Technology
TL;DR: This work outlines the Web technologies and the related threats within the framework of a Web threat environment and presents a number of security services that can be used for Web transactions categorised according to the Internet layering model.
Book ChapterDOI
Security in Distributed Data Systems
TL;DR: An overview of the background and current situation in the area of distributed data systems in Europe will further link the projects to international standardization and indicate the strategic direction of some of the future work.
The privacy feature of trusted computing technology using the concept of direct anonymous attestation with cloud as a technique
E. Padma,S. Rajalakshmi +1 more
TL;DR: The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security by increasing the security feature by the concept of DAA, which provides a balance between signer authentication and privacy.
Proceedings ArticleDOI
Security mechanism for distributed systems
Chang,Farn,Ching-Ho Lu +2 more
TL;DR: A numeric example and two lemmas reveal the feasibility of the proposed protocol, which is a new authentication protocol in distributed systems that identifies the applicant using his/her qualified key.
Journal ArticleDOI
Trusted Attestation System for Cloud Computing Environment Using Trusted Platform Module
E. Padma,S. Rajalakshmi +1 more
TL;DR: In the context of Trusted Attestation System in Cloud Computing Environment the Root of Trust for Attestation plays a vital role for security feature with Trusted Computing.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Proceedings ArticleDOI
A logic of authentication
TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI
Timestamps in key distribution protocols
TL;DR: It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.