Trust relationships in secure systems-a distributed authentication perspective
نویسندگان
چکیده
The notion of trust is fundamental in inter-domain au-thentication protocols. The goal of this paper is to develop an eeective formalism for explicit expressions of trust relations between entities involved in authentica-tion protocols. Diierent relevant types of trust are iden-tiied and classiied. A formalism for expressing trust relations is presented along with an algorithm for deriving trust relations from recommendations. The advantages of that approach are demonstrated by analysing and comparing the trust relation requirements of a few known authentication protocols.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملDisCo: A Distribution Infrastructure for Securely Deploying Decomposable Services in Partly Trusted Environments (TR2001-820)
The growing popularity of network-based services and peer-to-peer networks has resulted in situations where components of a distributed application often need to execute in environments that are only partly trusted by the application’s owner. Such deployment into partial or unstable trust environments exacerbates the classical problems of distributing decomposable services: authentication and a...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملTrust-Rated Authentication for Domain-Structured Distributed Systems
We present an authentication scheme and new protocol for domain-based scenarios with inter-domain authentication. Our protocol is primarily intended for domain-structured Peer-to-Peer systems but is applicable for any domain scenario where clients from different domains wish to authenticate to each other. To this end, we make use of Trusted Third Parties in the form of Domain Authentication Ser...
متن کامل