A Novel Approach to Hide Credentials

نویسندگان

  • Zhensong Liao
  • Hai Jin
  • Deqing Zou
  • Weizhong Qiang
چکیده

Credentials are useful in many applications. For example, automated trust negotiation can be attained through the exchange of credentials. However, credentials endure all kinds of attacks during the transport while credentials bring us a lot of benefits. At the same time, how to store credentials is still a key problem to manage trust management systems. Good credential-storage design can greatly reduce much overhead, such as easy to search credentials, less storage space, high application convenience and so on. In this paper, we propose a new approach to hide credentials, which satisfies all requirements of common credentials and provides a higher security as well without affecting the credentials transferring efficiency. It aims at attaining little storage space and high security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Practical Automated Trust Negotiation

Exchange of attribute credentials is a means to establish mutual trust between strangers that wish to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive credentials by using access control policies. Existing ATN work makes unrealistic simplifying assumptions about credential-representation languages and creden...

متن کامل

A Novel Patch-Based Digital Signature

In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...

متن کامل

High capacity steganography tool for Arabic text using 'Kashida'

Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...

متن کامل

An Abductive Protocol for Authorization Credential Gathering in Distributed Systems

The problem of authorization in large-scale decentralized systems has been addressed by a number of logic-based policy languages utilizing delegation of authority and distributed security credentials. A central task in this context is that of gathering a set of credentials for a given access request. Previous approaches have focused on methods in which credentials are pulled on-demand from cred...

متن کامل

Research on Data Hiding Capacity

To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models and several statistical host data models have been considered by the application of information theory. Based on the foundation, a solution is given to the problem about how many bits can be hidden in host data transp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2007