题名

Authentication and Lookup for Network Services

DOI

10.7903/ijecs.1040

作者

Daniel J. Buehrer;Tzu-Yang Wang

关键词

Sessional Authentication ; Sharing Network ; Sign-Up

期刊名称

International Journal of Electronic Commerce Studies

卷期/出版年月

5卷1期(2014 / 06 / 01)

页次

81 - 90

内容语文

英文

英文摘要

Sharing on networks is common nowadays. There are many sites, and users typically must register for an account on each site. Sometimes, sites or services can communicate or share data with each other or cooperate to perform some functions together. Such intercommunication between sites uses a shared network. However, some sites may not be trusted, and the user’s own data, especially passwords, might be exposed or fraudulent. Authentication is needed in order to both identify users and to hide user information via some authorization policies. In this paper, we describe a method for authentication via sessions. This authentication procedure is able to provide authentication of proxies and also allow concealed passwords. It is a little like OpenID^1 for websites, which prevents hacks and attacks from malicious servers and allows ordinary network connections. Moreover, it also allows proxy-proving, which permits only registered servers to be agents of a requesting user to request data from other servers.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. T. Dierks, and E. Rescorla, The transport layer security (TLS) protocol version 1.2, IETF. Retrieved on January 18, 2013, from http://tools.ietf.org/html/rfc5246
  2. S. Deering, and R. Hinden, Internet protocol, version 6 (IPv6), IETF. Retrieved on January 18, 2013, from http://tools.ietf.org/html/rfc2460
  3. A. Freier, P. Karlton, and P. Kocher, The secure sockets layer (SSL) protocol version 3.0, IETF. Retrieved on January 18, 2013, from http://tools.ietf.org/html/rfc6101
  4. Web Services Description Language, Retrieved on January 18, 2013, from http://www.w3.org/TR/wsdl20-adjuncts
  5. Berners-Lee, T.,Hendler, J.,Lassila, O.(2001).The semantic web.Scientific American,284(5),34-43.
  6. Hammer-Lahav, E.(2013).The OAuth 1.0 protocol
  7. Huang, W.-F.(2006).Taiwan,Institute of Computer Science and Information Engineering, National Chung Cheng University.
  8. Maler, E.,Reed, D.(2008).The venn of identity: Options and issues in federated identity management.IEEE Security and Privacy,6(2),16-23.
  9. Recordon, D.,Reed, D.(2006).OpenID 2.0: A platform for user-centric identity management.Proceedings of the second ACM workshop on Digital identity management,New York, NY, USA:
  10. Wang, H.,Fan, C.,Yang, S.,Zou, J.,Zhang, X.(2011).A new secure OpenID authentication mechanism using one-time password (OTP).7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM),Wuhan:
被引用次数
  1. 張人文(2018)。虛實整合之加工精度與效能優化智能監控系統。中原大學機械工程學系學位論文。2018。1-128。