Big Data Authentication and Authorization using SRP Protocol

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using the Secure Remote Password (SRP) Protocol for TLS Authentication

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This memo presents a technique for using the Secure Remote Password protocol as an authentication method for the Transport Layer Security protocol.

متن کامل

Authorization-Authentication Using XACML and SAML

The report discusses our experiences of using two OASIS Web service standards; namely eXtensible Access Control Mark-up Language which abbreviates to (XACML) and Security Assertion Mark-up Language or SAML as it is commonly known. Within the domain of the GOLD project we have combined these two standards to offer single login mechanisms, including a simple protocol for enabling the crossing of ...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Authentication and Authorization of Mobile Clients in Public Data Networks

We present a protocol that enables mobile clients to be authenticated and authorized in data networks that are deployed in public places otherwise referred to as hotspots! The three key elements of a hotspot network are the mobile client, the hotspot server and the service provider. A mobile client is any device that can be used to access the internet. The hotspot server is a node in the data n...

متن کامل

Identity Security Using Authentication and Authorization in Cloud Computing

The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to their consumers according to their pay per usage of economic model. Anyhow this new technology introduces new immerse for enterprises and bussiness admired their security and privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2015

ISSN: 0975-8887

DOI: 10.5120/ijca2015906862