Big Data Authentication and Authorization using SRP Protocol
نویسندگان
چکیده
منابع مشابه
Using the Secure Remote Password (SRP) Protocol for TLS Authentication
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This memo presents a technique for using the Secure Remote Password protocol as an authentication method for the Transport Layer Security protocol.
متن کاملAuthorization-Authentication Using XACML and SAML
The report discusses our experiences of using two OASIS Web service standards; namely eXtensible Access Control Mark-up Language which abbreviates to (XACML) and Security Assertion Mark-up Language or SAML as it is commonly known. Within the domain of the GOLD project we have combined these two standards to offer single login mechanisms, including a simple protocol for enabling the crossing of ...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملAuthentication and Authorization of Mobile Clients in Public Data Networks
We present a protocol that enables mobile clients to be authenticated and authorized in data networks that are deployed in public places otherwise referred to as hotspots! The three key elements of a hotspot network are the mobile client, the hotspot server and the service provider. A mobile client is any device that can be used to access the internet. The hotspot server is a node in the data n...
متن کاملIdentity Security Using Authentication and Authorization in Cloud Computing
The Growth of the Cloud Computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of Computing Services to their consumers according to their pay per usage of economic model. Anyhow this new technology introduces new immerse for enterprises and bussiness admired their security and privac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/ijca2015906862