Trustworthy clients: Extending TNC to web-based environments
Computer Communications
Journal of Systems Architecture: the EUROMICRO Journal
Principles of Information Security
Principles of Information Security
Intelligent security and access control framework for service-oriented architecture
Information and Software Technology
Looking at web security vulnerabilities from the programming language perspective: a field study
ISSRE'09 Proceedings of the 20th IEEE international conference on software reliability engineering
Secure negotiation approach for share-secret-key of Kerberos service
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Hi-index | 0.00 |
The increasing popularity of distributed web has promoted the development of new techniques to support various kinds of applications. However, users are faced with insecurity due to its inherent untrustworthiness. An identity (ID) authentication mechanism was presented. Using Kerberos protocol, Local web and Remote web could authenticate the client. If mutual authentication was required, client could also authenticate Local web and Remote web. Moreover, encryption function in the authentication process adopted Rijndael encryption algorithm of AES (Advanced Encryption Standard). Security analysis proves that this authentication process is no-impersonating and has highly availability, and also shows it is transparent and scalable and resisting attack.