14,561 Hits in 9.2 sec

CredEx: user-centric credential management for grid and Web services

D. Del Vecchio, M. Humphrey, J. Basney, N. Nagaratnam
2005 IEEE International Conference on Web Services (ICWS'05)  
In contrast, we present CredEx, an open-source, standards-based Web Service that facilitates the secure storage of credentials and enables the dynamic exchange of different credential types using the WS-Trust  ...  token exchange protocol.  ...  CredEx Features and Design Our credential exchanger, CredEx, aims to bring flexibility to the authentication token exchange process through several key design features: • Web-services based protocol built  ... 
doi:10.1109/icws.2005.43 dblp:conf/icws/VecchioHBN05 fatcat:y2nz2g4mo5fcfa4rbec7ihnnyi

A secure channel for attribute-based credentials

Gergely Alpár, Jaap-Henk Hoepman
2013 Proceedings of the 2013 ACM workshop on Digital identity management - DIM '13  
They enable the disclosure of a minimum amount of information about their owner to a verifier, typically a service provider, to authorise the credential owner for some service, application, or resource  ...  We present two efficient and provably secure protocols under standard assumptions in the random oracle model.  ...  Furthermore, we also want to thank Pim Vullers for the thorough proofreading and helpful comments and the whole IRMA team for several valuable discussions.  ... 
doi:10.1145/2517881.2517884 dblp:conf/dim/AlparH13 fatcat:d64hv4lc3ze5vawworkw5wh55u

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Jiangshan Yu, Guilin Wang, Yi Mu
2012 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications  
Also, we propose a provably secure single sign-on authentication scheme, which satisfies soundness, preserves credential privacy, meets user anonymity, and supports session key exchange.  ...  To overcome this drawback, we formalise the security model of single sign-on scheme with authenticated key exchange.  ...  The secure authenticated key exchange single sign-on (AKESSO) scheme requires secure credential based user authentication (SCU A), secure service provider authentication (SSP A), and secure session key  ... 
doi:10.1109/trustcom.2012.228 dblp:conf/trustcom/YuWM12 fatcat:jndwzhdmzvh65ioi2xmfdgebhm

Authentication Service Model Supporting Multiple Domains in Distributed Computing [chapter]

Kyung-Ah Chang, Byung-Rae Lee, Tai-Yun Kim
2001 Lecture Notes in Computer Science  
In this paper, based on CORBA security service specification [1, 3], we propose the authentication service model supporting multiple domains for distributed computing with an extension to the Kerberos[  ...  13] authentication framework using public key cryptosystem [15] .  ...  Authentication Service Model Supporting Multiple Domains Research should be made on the efficient object system to support a distributed security mechanism, and offer a more elaborated security infrastructure  ... 
doi:10.1007/3-540-45545-0_50 fatcat:maqbo3ptanbmvj6kiwezikyh5y

Secure password-based authenticated key exchange for web services

Liang Fang, Samuel Meder, Olivier Chevassut, Frank Siebenlist
2004 Proceedings of the 2004 workshop on Secure web service - SWS '04  
This IEEEspecified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-SecureConversation are emerging Web Services Security specifications  ...  This paper discusses an implementation of an authenticated keyexchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications.  ...  1 Fang's work was completed during his internship in Mathematics and Computer Science Division, Argonne National Laboratory.  ... 
doi:10.1145/1111348.1111350 dblp:conf/sws/FangMCS04 fatcat:47ibxip37vbt3a6dv7pbbujjau

Confidence Analysis of a Solo Sign-On Device for Distributed Computer Networks

Sumanth C M, Adithyan B
2014 International Journal of Information Technology and Computer Science  
Solo sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network.  ...  Recently, a SSO scheme proposed and claimed its security by providing well organized security arguments.  ...  Based on the respective secret tokens, a user and a service provider can authenticate each other and exchange a common session key.  ... 
doi:10.5815/ijitcs.2014.07.06 fatcat:dp7udsjouvb75myypps5q6ucu4

Security Mechanism for Authentication

Mr. Kurhe B. S.
2016 International Journal Of Engineering And Computer Science  
This is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks.  ...  Identification of user is an important access control mechanism for client-server networking architectures.  ...  Once mutual authentication, a session key is also negotiated to keep the confidentiality of the data exchanged between a user and a service provider.  ... 
doi:10.18535/ijecs/v4i10.13 fatcat:oknn5g7cabc5ndfxgjlkgxiqfa

Security Protocols with Privacy and Anonymity of Users

Nazri bin Abdullah, Sead Muftic
2015 Universal Journal of Communications and Network  
This paper describes an innovative solution to this problem: a design of extensions of standard security protocols -user authentication, key exchange protocol, and authorization protocol -to include privacy  ...  The requirements for providing standard security services, that require sharing of user identities and security credentials, are contrary to the requirements of privacy and anonymity.  ...  Acknowledgements The authors would like to thank anonymous reviewers for their valuable comments and suggestions that have greatly improved the content and quality of the paper.  ... 
doi:10.13189/ujcn.2015.030403 fatcat:fss23xt5rfgrfh5otvbdf4w3gm

An Online Credential Management Service for InterGrid Computing

Jemal H. Abawajy
2008 2008 IEEE Asia-Pacific Services Computing Conference  
This paper describes architecture of a scalable, secure and reliable on-line credential management service called SafeBox for InterGrid computing platform.  ...  SafeBox provides InterGrid users with secure mechanism for storing one or multiple credentials and access them based on need at anytime from anywhere.  ...  in Fig. 2 and then dynamically exchanging that credential as needed for services that authenticate a different way.  ... 
doi:10.1109/apscc.2008.74 dblp:conf/apscc/Abawajy08 fatcat:qpep2ejhqfd23j4jmn4naeaf6i

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing [chapter]

Timo Kasper, Alexander Kühn, David Oswald, Christian Zenger, Christof Paar
2013 Lecture Notes in Computer Science  
During the booking process, the phone operates as an RFID reader to interrogate the nPA of the user and utilizes the security mechanisms of the nPA, including the PACE protocol, for identifying the customer  ...  This credential is safely transported via the Internet to the user's smartphone and finally grants access to an NFC-enabled object.  ...  During the PACE protocol, two shared session keys are generated, namely an encryption key K enc and a key K MAC for authentication with a Cipher-based MAC (CMAC) [14] .  ... 
doi:10.1007/978-3-642-41332-2_3 fatcat:cvwuy5wfqrfydkluplmlcpwcfy

Improving Privacy and Trust in Federated Identity Using SAML with Hash Based Encryption Algorithm [article]

Jissy Ann George, S.Veni, Safeeullah Soomro
2018 arXiv   pre-print
Hash based Encryption algorithm with the help of the Key Exchange Protocol.  ...  HBE algorithm works with the help of Key Exchange Protocol which contains poly hash function.  ...  ACKNOWLEDGMENT Part of this work was done for my Thesis work Titled, "Improved User-Centric Identity Management Solution Using Cryptographic Techniques for Cloud Security".  ... 
arXiv:1803.02891v1 fatcat:2yj6nrmw4nc2jevpkmlxpbgy3y

NEMA EVSE 1 A Charging Network Interoperability Standard - A Contactless RFID Credential for Authentication

Steve Griffith
2020 Zenodo  
This NEMA standard describes a protocol for authenticating EV charging service requests using contactless proximity Radio Frequency Identification (RFID)–type credentials.  ...  Authentication provides assurance to the Electric Vehicle (EV) charging network that the EV driver is the correct authorized party incurring a financial or other obligation for the services to be rendered  ...  The protocol specified in this standard enables secure and trustable EV charging service transactions to take place for both the service provider and the service consumer.  ... 
doi:10.5281/zenodo.4021497 fatcat:gdnjiimzkzczvlnum2w2o3h2di

Stateless Re-Association in WPA3 Using Paired Token

Byoungcheon Lee
2021 Electronics  
In Wi-Fi Protected Access 3 (WPA3), a secure connection is established in two sequential stages. Firstly, in the authentication and association stage, a pairwise master key (PMK) is generated.  ...  Once a client is equipped with PT, it can be used for many symmetric key-based cryptographic applications such as authentication, authorization, key establishment, etc.  ...  Special thanks to Yulian Zheng for the favor of invitation and many helpful discussions on this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10020215 fatcat:6uwxwbkqxrghrf2tskdtdpagym

Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol [chapter]

Maria Christofi, Aline Gouget
2012 IFIP Advances in Information and Communication Technology  
Internet services such as online banking, social networking and other web services require identification and authentication means.  ...  The European Citizen card can be used to provide a privacy-preserving authentication for Internet services enabling e.g. an anonymous age verification or other forms of anonymous attribute verification  ...  There is a mutual authentication using the mERA1-7 protocol and the card securely transmits the privacy preserving credential to the service provider. These exchanges are detailed in Figure 1 .  ... 
doi:10.1007/978-3-642-30436-1_25 fatcat:p4xjoksaejcljipxetvkxoxomu

A Survey on Single Sign-On Techniques

V. Radha, D. Hitha Reddy
2012 Procedia Technology - Elsevier  
It reduces the risk for the administrators to manage users centrally, increases user productivity by allowing mobility and allows users to access multiple services or applications after being authenticated  ...  This doesn't mean that the SSO system unifies account information for all services, applications and systems, rather it hides such a multiplicity of account information into a single account that the user  ...  Security Assertion Markup Language: Security Assertion Markup Language (SAML) is an XML-based open standard for exchanging authentication and authorization data between security domains, i.e., an identity  ... 
doi:10.1016/j.protcy.2012.05.019 fatcat:ixo4hulo6nff3afkr6xslae4jy
« Previous Showing results 1 — 15 out of 14,561 results