Security Authorization for MAC Address under Distributed Environment
نویسندگان
چکیده
منابع مشابه
Security Agent Based Distributed Authorization : An Approach
This paper considers a security agent based approach to authorization in a distributed environment. A security agent is used to capture the privileges and a part of security policy in distributed authorization. Principals make use of these agents to carry out their requests on remote hosts. Targets verify the authenticity of the security agent and its privileges and use them together with their...
متن کاملSecurity Management for Distributed Environment
–A mobile database is a database that can be connected to by a mobile computing device over a mobile network. Mobile processed information in database systems is distributed, heterogeneous, and replicated. They are endangered by various threats based on user’s mobility and restricted mobile resources of portable devices and wireless links. Since mobile circumstances can be very dynamic, standar...
متن کاملComparative Analysis of Authentication and Authorization Security in Distributed System
In this paper different types of processes of authentication and authorization analyzed individually in a comparative way. Some time it may be seen that one process is complementary with another process so comparative analysis can detect why they are complement. Bringing a best output such as low cost, saving time, high confidentiality, adaptability etc are the results of this paper. This thesi...
متن کاملA Review: PAKE Security for Distributed Environment
With the advancement of technology, communications today should be secured by secret session key. A password-authenticated key agreement method is an interactive password based method to establish secret session keys. A number of protocols for Password based Authentication and Key Exchange (PAKE) is designed for the single server environment where each user shares a password with a server. Thes...
متن کاملRisk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all assertions as equally valid up to certificate authentication, realistic considerations may associate risk with some of these elements, for example some actors may be less trusted than others. Furthermore, practical online a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/ijca2015907381