메뉴 건너뛰기




Volumn , Issue , 2007, Pages 59-66

Towards user authentication flexibility

Author keywords

Access control; Authentication; Subjective logic

Indexed keywords

ACCESS CONTROL POLICIES; AUTHORIZATION SERVICES; SUBJECTIVE LOGIC; USER AUTHENTICATION;

EID: 67649791213     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 3
    • 67649711519 scopus 로고    scopus 로고
    • J.T Kohl, B.C Neuman, T. T. (1994). The evolution of the kerberos authentication system. In Distributed Open Systems. IEEE Computer Society Press.
    • J.T Kohl, B.C Neuman, T. T. (1994). The evolution of the kerberos authentication system. In Distributed Open Systems. IEEE Computer Society Press.
  • 4
    • 67649736892 scopus 로고    scopus 로고
    • Liberty Alliance (2005). Liberty Alliance Project.
    • Liberty Alliance (2005). Liberty Alliance Project.
  • 5
    • 67649711520 scopus 로고    scopus 로고
    • M. Covington, M. A. e. a. (2004). Parametrized authentication. In Proceedings of the 9th European Symposium on Research in Computer Security. Springer.
    • M. Covington, M. A. e. a. (2004). Parametrized authentication. In Proceedings of the 9th European Symposium on Research in Computer Security. Springer.
  • 6
    • 13244288768 scopus 로고    scopus 로고
    • M.K Reither, S. S. (1999). Authentication metric analysis and design. In ACM Transactions on Information and System Security. ACM Press.
    • M.K Reither, S. S. (1999). Authentication metric analysis and design. In ACM Transactions on Information and System Security. ACM Press.
  • 7
    • 67649685405 scopus 로고    scopus 로고
    • OASIS (2005). XACML 2.0 - extended Access Control Markup Language.
    • OASIS (2005). XACML 2.0 - extended Access Control Markup Language.
  • 9
    • 14844315770 scopus 로고    scopus 로고
    • S Ganeriwal, M. S. (2004). Reputation-based framework for high integrity sensor networks. In SASN 04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM Press.
    • S Ganeriwal, M. S. (2004). Reputation-based framework for high integrity sensor networks. In SASN 04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM Press.
  • 10
    • 16444376120 scopus 로고    scopus 로고
    • Two-Factor Authentication: Too Little, Too Late
    • Schneier, B. (2005). Two-Factor Authentication: Too Little, Too Late. Communication of the ACM/Vol 48, No.4.
    • (2005) Communication of the ACM , vol.48 , Issue.4
    • Schneier, B.1
  • 12
    • 67649719033 scopus 로고    scopus 로고
    • W. Burr, D. Dodson, W. P. (2006). Electronic authentication guideline. In NIST Special Publication 800 63. National Institue of Standards and Technology.
    • W. Burr, D. Dodson, W. P. (2006). Electronic authentication guideline. In NIST Special Publication 800 63. National Institue of Standards and Technology.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.