Blocking Java applets at the firewall

DM Martin, S Rajagopalan… - Proceedings of SNDSS'97 …, 1997 - ieeexplore.ieee.org
This paper explores the problem of protecting a site on the Internet against hostile external
Java applets while allowing trusted internal applets to run. With careful implementation, a …

A replay attack resilient system for PKI based authentication in challenge-response mode for online application

S Goswami, S Misra, M Mukesh - 2014 3rd International …, 2014 - ieeexplore.ieee.org
Passwords had been the common mechanism for authentication in the earlier day's client-
server based systems as well as in the modern day online applications. However, it is the …

[PDF][PDF] Multi-Application Authentication based on Multi-Agent System.

S Fugkeaw, P Manpanpanich… - … International Journal of …, 2007 - iaeng.org
This paper proposes an authentication approach to support multi-clients in using a multi-
application based environment. The approach is primarily based on the public key …

A robust single sign-on model based on multi-agent system and PKI

S Fugkeaw, P Manpanpanich… - … on Networking (ICN'07), 2007 - ieeexplore.ieee.org
In this paper, we propose a novel single sign-on (SSO) approach based on multi-agent
system (MAS) and public key infrastructure (PKI) authentication scheme. This allows the …

[PDF][PDF] 普适环境中基于身份的跨域认证方案

罗长远, 霍士伟, 邢洪智 - 通信学报, 2011 - infocomm-journal.com
利用椭圆曲线加法群提出了一种基于身份的签名算法, 算法中签名的验证结果相对于签名者身份
是一个常量, 该算法可保证跨域认证中用户身份的匿名性, 并且避免了复杂的双线性对运算 …

Intelligent pervasive network authentication: S/key based device authentication

DG Lee, JW Han, DS Park - 2009 6th IEEE Consumer …, 2009 - ieeexplore.ieee.org
The intelligent pervasive network environment is thing which invisible computer that is not
shown linked mutually through network so that user may use computer always is been …

Exploiting X. 509 certificate and multi-agent system architecture for role-based access control and authentication management

S Fugkeaw, P Manpanpanich… - 7th IEEE International …, 2007 - ieeexplore.ieee.org
This paper proposes the design of multi-user authentication in the multi-application based
environment and role-based access control by using PKI Authentication and X. 509 privilege …

A development of multi-SSO authentication and RBAC model in the distributed systems

S Fugkeaw, P Manpanpanich… - 2007 2nd International …, 2007 - ieeexplore.ieee.org
This paper proposes the design and development of SSO two factor authentication and
RBAC authorization in the multiple applications and multi-domain environment. The …

Smart environment authentication: Multi-domain authentication, authorization, security policy for pervasive network

DG Lee, GW Kim, JW Han, YS Jeong… - 2008 International …, 2008 - ieeexplore.ieee.org
As a number of home network services are available and smart environment is expanding
into ubiquitous computing environment, we need to protect smart environment system from …

AmTRUE: authentication management and trusted role-based authorization in multi-application and multi-user environment

S Fugkeaw, P Manpanpanich… - … on Emerging Security …, 2007 - ieeexplore.ieee.org
This paper proposes a hybrid model of an authentication technique and a role based access
control (RBAC) based on X. 509 public key certificate and attribute certificate. With attribute …