How to withstand mobile virus attacks (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Simplified Approach to Threshold and Proactive RSA
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
Secure peer-to-peer 3D streaming
Multimedia Tools and Applications
A new authentication model based on CL-PKC in resource limited P2P systems
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Logical attestation: an authorization architecture for trustworthy computing
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Secure billing for ubiquitous service delivery
ICQT'06 Proceedings of the 5th international conference on Internet Charging and QoS Technologies: performability has its Price
ThresPassport – a distributed single sign-on service
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Architecture framework for device single sign on in personal area networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
A p2p-based framework for distributed network management
EURO-NGI'05 Proceedings of the Second international conference on Wireless Systems and Network Architectures in Next Generation Internet
A trust evolution model for P2P networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
The Journal of Supercomputing
Hi-index | 0.00 |
CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication servers that reside in separate administrative domains. CorSSO authentication policies enable the system to tolerate expected classes of attacks and failures. A novel partitioning of the work associated with authentication of principals means that the system scales well with increases in the numbers of users and services.