Topic
SSLIOP
About: SSLIOP is a research topic. Over the lifetime, 503 publications have been published within this topic receiving 9453 citations.
Papers published on a yearly basis
Papers
More filters
[...]
01 Aug 2011
TL;DR: This document specifies Version 3.0 of the Secure Sockets Layer protocol, a security protocol that provides communications privacy over the Internet that is designed to prevent eavesdropping, tampering, or message forgery.
Abstract: This document specifies Version 3.0 of the Secure Sockets Layer (SSL
V3.0) protocol, a security protocol that provides communications
privacy over the Internet. The protocol allows client/server
applications to communicate in a way that is designed to prevent
eavesdropping, tampering, or message forgery.
386 citations
[...]
01 Jan 2006
TL;DR: The SSH transport layer protocol is described, which typically runs on top of TCP/IP, and key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.
Abstract: The Secure Shell (SSH) is a protocol for secure remote login and other
secure network services over an insecure network. This document
describes the SSH transport layer protocol, which typically runs on
top of TCP/IP. The protocol can be used as a basis for a number of
secure network services. It provides strong encryption, server
authentication, and integrity protection. It may also provide
compression. Key exchange method, public key algorithm, symmetric
encryption algorithm, message authentication algorithm, and hash
algorithm are all negotiated. This document also describes the
Diffie-Hellman key exchange method and the minimal set of algorithms
that are needed to implement the SSH transport layer protocol.
[STANDARDS-TRACK]
314 citations
[...]
TL;DR: Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side, which is very suited to the massive-scale cloud.
Abstract: Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded point both in computation and communication. This paper, based on the identity-based hierarchical model for cloud computing (IBHMCC) and its corresponding encryption and signature schemes, presented a new identity-based authentication protocol for cloud computing and services. Through simulation testing, it is shown that the authentication protocol is more lightweight and efficient than SAP, specially the more lightweight user side. Such merit of our model with great scalability is very suited to the massive-scale cloud.
273 citations
Patent•
[...]
IBM1
TL;DR: In this paper, the authors present a system and method for defining a platform-independent policy framework for authentication of principals to servers in another realm, within a distributed data processing system, which may be implemented on top of the Kerberos protocol, or any trusted third party network authentication protocol with inter-realm authentication mechanisms.
Abstract: A system and method for defining a platform-independent policy framework for authentication of principals to servers in another realm, within a distributed data processing system. The present invention may be implemented on top of the Kerberos protocol, or any trusted third party network authentication protocol with inter-realm authentication mechanisms.
252 citations
[...]
TL;DR: An efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses and is extremely suitable for use in distributed multi- server architecture.
Abstract: Generally, if a user wants to use numerous different network services, he/she must register himself/herself to every service providing server. It is extremely hard for users to remember these different identities and passwords. In order to resolve this problem, various multi-server authentication protocols have been proposed. Recently, Sood et al. analyzed Hsiang and Shih's multi-server authentication protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication, the session key agreement and can resist several kinds of attacks. However, through careful analysis, we find that Sood et al.'s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack. Besides, since there is no way for the control server CS to know the real identity of the user, the authentication and session key agreement phase of Sood et al.'s protocol is incorrect. We propose an efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses. The proposed protocol is extremely suitable for use in distributed multi-server architecture since it provides user's anonymity, mutual authentication, efficient, and security.
246 citations