Certificate Authentication Based Information Sharing
نویسندگان
چکیده
منابع مشابه
Certificate-Based Access Control and Authentication for DHCP
In the current Dynamic Host Configuration Protocol, security is not considered. DHCP itself does support neither an access control for a proper user nor the mechanism with which clients and servers authenticate each other. In this paper, we introduce a novel authentication and access control mechanism for DHCP systems. This solution defines a new DHCP option that provides the authentication of ...
متن کاملSecurity of Public Key Certificate Based Authentication Protocols
The security of authentication protocols based on public key cryptography depends on the validity of the certificate. It is usually assumed that a well deployed PKI can guarantee the validity of certificates through mechanisms such as CRL or OCSP. In reality, such guarantee is not always assured. This paper describes an attack that exploits this certificate validity weakness and breaks some wel...
متن کاملA Lightweight Mutual Authentication Based on Proxy Certificate Trust List
We propose Proxy Certificate Trust List (PCTL) to efficiently record delegation traces for grid computing. Our security solution based on PCTL provides functions as follows: (1) On-demand inquiries about real time delegation information of grid computing underway; (2) Lightweight mutual authentication that is beneficial for proxy nodes with limited computation power as wireless devices in mobil...
متن کاملEvaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks
The certificate-based authentication is well studied in wired networks. However, adapting certificatebased authentication protocols to mobile ad hoc networks (MANETs) is a nontrivial task, mainly because, in a MANET, as opposed to conventional wired networks, there typically exists no fixed infrastructure or centralized management. For example, a conventional certificate-based authentication sy...
متن کاملTrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
We describe TrustBase, an architecture that provides certificate-based authentication as an operating system service. TrustBase enforces best practices for certificate validation for all applications and transparently enables existing applications to be strengthened against failures of the CA system. The TrustBase system allows simple deployment of authentication systems that harden the CA syst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Techniques
سال: 2020
ISSN: 2394-2231
DOI: 10.29126/23942231/ijct-v7i3p2