Blocking Java applets at the firewall
DM Martin, S Rajagopalan… - Proceedings of SNDSS'97 …, 1997 - ieeexplore.ieee.org
This paper explores the problem of protecting a site on the Internet against hostile external
Java applets while allowing trusted internal applets to run. With careful implementation, a …
Java applets while allowing trusted internal applets to run. With careful implementation, a …
A replay attack resilient system for PKI based authentication in challenge-response mode for online application
Passwords had been the common mechanism for authentication in the earlier day's client-
server based systems as well as in the modern day online applications. However, it is the …
server based systems as well as in the modern day online applications. However, it is the …
[PDF][PDF] Multi-Application Authentication based on Multi-Agent System.
S Fugkeaw, P Manpanpanich… - … International Journal of …, 2007 - iaeng.org
This paper proposes an authentication approach to support multi-clients in using a multi-
application based environment. The approach is primarily based on the public key …
application based environment. The approach is primarily based on the public key …
A robust single sign-on model based on multi-agent system and PKI
S Fugkeaw, P Manpanpanich… - … on Networking (ICN'07), 2007 - ieeexplore.ieee.org
In this paper, we propose a novel single sign-on (SSO) approach based on multi-agent
system (MAS) and public key infrastructure (PKI) authentication scheme. This allows the …
system (MAS) and public key infrastructure (PKI) authentication scheme. This allows the …
[PDF][PDF] 普适环境中基于身份的跨域认证方案
罗长远, 霍士伟, 邢洪智 - 通信学报, 2011 - infocomm-journal.com
利用椭圆曲线加法群提出了一种基于身份的签名算法, 算法中签名的验证结果相对于签名者身份
是一个常量, 该算法可保证跨域认证中用户身份的匿名性, 并且避免了复杂的双线性对运算 …
是一个常量, 该算法可保证跨域认证中用户身份的匿名性, 并且避免了复杂的双线性对运算 …
Intelligent pervasive network authentication: S/key based device authentication
The intelligent pervasive network environment is thing which invisible computer that is not
shown linked mutually through network so that user may use computer always is been …
shown linked mutually through network so that user may use computer always is been …
Exploiting X. 509 certificate and multi-agent system architecture for role-based access control and authentication management
S Fugkeaw, P Manpanpanich… - 7th IEEE International …, 2007 - ieeexplore.ieee.org
This paper proposes the design of multi-user authentication in the multi-application based
environment and role-based access control by using PKI Authentication and X. 509 privilege …
environment and role-based access control by using PKI Authentication and X. 509 privilege …
A development of multi-SSO authentication and RBAC model in the distributed systems
S Fugkeaw, P Manpanpanich… - 2007 2nd International …, 2007 - ieeexplore.ieee.org
This paper proposes the design and development of SSO two factor authentication and
RBAC authorization in the multiple applications and multi-domain environment. The …
RBAC authorization in the multiple applications and multi-domain environment. The …
Smart environment authentication: Multi-domain authentication, authorization, security policy for pervasive network
As a number of home network services are available and smart environment is expanding
into ubiquitous computing environment, we need to protect smart environment system from …
into ubiquitous computing environment, we need to protect smart environment system from …
AmTRUE: authentication management and trusted role-based authorization in multi-application and multi-user environment
S Fugkeaw, P Manpanpanich… - … on Emerging Security …, 2007 - ieeexplore.ieee.org
This paper proposes a hybrid model of an authentication technique and a role based access
control (RBAC) based on X. 509 public key certificate and attribute certificate. With attribute …
control (RBAC) based on X. 509 public key certificate and attribute certificate. With attribute …