Proximity - Based Authentication for Windows Domains
نویسندگان
چکیده
Over the past few years, several authentication methods based on location-limited channels have been presented in research literature. We extend this notion to location-aware, zero-interaction authentication, present an efficient protocol implementation, and describe the integration of our authentication system into a state-of-the-art enterprise network solution.
منابع مشابه
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployment of such applications provides additional benefits, enabling the application to flexibly adapt to changing client and network characteristics, achieve load balancing, and satisfy QoS requirements. However, dynamic de...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملIntegrated Identity Mechanism for Ubiquitous Service Access
Ubiquitous access and pervasive computing enable innovative services and provide the service access in every situation. People currently rely on numerous forms of identities to access remote or proximity services. The inconvenience of possessing and using these identities creates significant security vulnerability. This paper proposes an architecture that integrates the identities required to a...
متن کاملSMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation of email domains and IP addresses based on analyzing the paths used to transmit known spam and known good mail. The result is an effective algorithm providing the reputation information needed to combine with domain a...
متن کاملTrust-Rated Authentication for Domain-Structured Distributed Systems
We present an authentication scheme and new protocol for domain-based scenarios with inter-domain authentication. Our protocol is primarily intended for domain-structured Peer-to-Peer systems but is applicable for any domain scenario where clients from different domains wish to authenticate to each other. To this end, we make use of Trusted Third Parties in the form of Domain Authentication Ser...
متن کامل