منابع مشابه
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses
SUMMARY In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al. [8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al. [10]. In both systems proposed in [8] ...
متن کاملUser-Friendly Authentication and Authorization Using a Smartphone Proxy
We present a novel approach to authenticate and authorize a user, using her personal smartphone. The presented architecture is complemented with a proof-of-concept implementation. The implemented system architecture is based on a single sign-on solution (SSO), extended to allow the usage of the smartphone as authentication and authorization device. We evaluated the system within real-world scen...
متن کاملCertificateless Identity-based Proxy Signature for Grid Computing Authorization
In this paper we propose a new Identity-based certificateless proxy signature transferable to a chain of proxy signers enabling fine-grained delegation, Authentication and Authorization decoupling, and Attributes-based Authorization within the Grid environment without relying on any kind of PKI certificates, proxy certificates or attribute certificates. Security and performance analysis of the ...
متن کاملProxy-Based Authorization and Accounting for Distributed Systems
Despite recent widespread interest in the secure au-thentication of principals across computer networks there has been considerably less discussion of distributed m e chanisms to support authorization and accounting. By generalizing the authentication model to support restricted p r oxies, both authorization and accounting can be e asily supported. This paper presents the proxy model for author...
متن کاملFurther Study on Proxy Authorization and Its Scheme
Proxy authorization makes it possible to entrust the right of signing or making decisions to other parties. This paper analyzes the basic principles and security problems of proxy authorization schemes and presents three proxy authorization schemes based on elliptic curves cryptosystem. In the first multiparty proxy authorization scheme, a group of n members can cooperate to entrust their right...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Glasnik Advokatske komore Vojvodine
سال: 2012
ISSN: 0017-0933
DOI: 10.5937/gakv1212790m