Flexible authentication framework with bound authentication and authorization

  • Authors:
  • Jan Hajny;Tomáš Pelka;Václav Zeman

  • Affiliations:
  • Department of Telecommunications, Brno University of Technology, Brno, Czech Republic;Department of Telecommunications, Brno University of Technology, Brno, Czech Republic;Department of Telecommunications, Brno University of Technology, Brno, Czech Republic

  • Venue:
  • WSEAS TRANSACTIONS on COMMUNICATIONS
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

User authentication is an important part of computer network cryptography. It becomes more and more essential for security with the latest progress in the field of computer science. We analyze latest trends in the article. Our goal is to answer the question whether these trends reflect current state in computer networks. We are focused on security and from this point of view we find the progress unsatisfactory. The reason is that most of current work is focused on operational parameters more than on security. That's why we give an example of less known authentication methods which can solve the most important issues of current protocols - security and protocol flexibility. The main advantage of one of these methods is its mathematical model which can prove security. As the flexibility of the method is also vital for modern multi domain networks we provide a modification of this method to improve the process of authentication and authorization.