Proximity - Based Authentication for Windows Domains

نویسندگان

  • Erwin Aitenbichler
  • Andreas Heinemann
چکیده

Over the past few years, several authentication methods based on location-limited channels have been presented in research literature. We extend this notion to location-aware, zero-interaction authentication, present an efficient protocol implementation, and describe the integration of our authentication system into a state-of-the-art enterprise network solution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Views for Customizing Reusable Components in Component-Based Frameworks

Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployment of such applications provides additional benefits, enabling the application to flexibly adapt to changing client and network characteristics, achieve load balancing, and satisfy QoS requirements. However, dynamic de...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Integrated Identity Mechanism for Ubiquitous Service Access

Ubiquitous access and pervasive computing enable innovative services and provide the service access in every situation. People currently rely on numerous forms of identities to access remote or proximity services. The inconvenience of possessing and using these identities creates significant security vulnerability. This paper proposes an architecture that integrates the identities required to a...

متن کامل

SMTP Path Analysis

Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation of email domains and IP addresses based on analyzing the paths used to transmit known spam and known good mail. The result is an effective algorithm providing the reputation information needed to combine with domain a...

متن کامل

Trust-Rated Authentication for Domain-Structured Distributed Systems

We present an authentication scheme and new protocol for domain-based scenarios with inter-domain authentication. Our protocol is primarily intended for domain-structured Peer-to-Peer systems but is applicable for any domain scenario where clients from different domains wish to authenticate to each other. To this end, we make use of Trusted Third Parties in the form of Domain Authentication Ser...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007