메뉴 건너뛰기




Volumn 23, Issue 7, 2004, Pages 578-590

Authentication and authorization infrastructures (AAIs): A comparative survey

Author keywords

.Net passport; Attribute certificates; Authentication and authorization infrastructure; Identity management; Kerberos; Public key certificates

Indexed keywords

APPROXIMATION THEORY; ELECTRONIC COMMERCE; INTERNET; PROBABILITY; PROJECT MANAGEMENT; RISK ASSESSMENT;

EID: 8344266879     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.06.013     Document Type: Article
Times cited : (80)

References (44)
  • 4
    • 0024135278 scopus 로고
    • The personal model of data: Towards a privacy-oriented information system
    • Biskup J, Brüggemann HH. The personal model of data: towards a privacy-oriented information system. Computers and Security 1988;7.
    • (1988) Computers and Security , pp. 7
    • Biskup, J.1    Brüggemann, H.H.2
  • 5
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • MITRE Corp. Bedford, Mass
    • Bell DE, LaPadula U. Secure computer system: unified exposition and multics interpretation. Technical Report MTR-2997. MITRE Corp. Bedford, Mass; 1976.
    • (1976) Technical Report , vol.MTR-2997
    • Bell, D.E.1    LaPadula, U.2
  • 9
    • 84945298985 scopus 로고    scopus 로고
    • A new design of privilege management infrastructure for organizations using outsourced PKI
    • Lecture notes in computer science. Springer-Verlag; September
    • Dawson E, Lopez J, Montenegro A, Okamoto E. A new design of privilege management infrastructure for organizations using outsourced PKI. In: Fifth international conference on information security (ISC'02). Lecture notes in computer science, vol. 2433. Springer-Verlag; September 2002. p. 136-49.
    • (2002) Fifth International Conference on Information Security (ISC'02) , vol.2433 , pp. 136-149
    • Dawson, E.1    Lopez, J.2    Montenegro, A.3    Okamoto, E.4
  • 13
    • 1942521913 scopus 로고    scopus 로고
    • SPKI requirements
    • Network Working Group, Internet Engineering Task Force; September
    • Ellison C. SPKI requirements. Request for Comments 2692, Network Working Group, Internet Engineering Task Force; September 1999.
    • (1999) Request for Comments 2692
    • Ellison, C.1
  • 15
    • 0038150613 scopus 로고    scopus 로고
    • An Internet attribute certificate profile for authorization
    • Network Working Group, Internet Engineering Task Force; April
    • Farrell S, Housley R. An Internet attribute certificate profile for authorization. Request for Comments 3281, Network Working Group, Internet Engineering Task Force; April 2002.
    • (2002) Request for Comments 3281
    • Farrell, S.1    Housley, R.2
  • 18
    • 0010307926 scopus 로고    scopus 로고
    • Digital Commerce Society of Boston; November
    • Geer D. Risk management is where the money is. Digital Commerce Society of Boston; November 1998. 〈http:// catless.ncl.ac.uk/Risks/20.06. html#subj1〉.
    • (1998) Risk Management Is Where the Money Is
    • Geer, D.1
  • 21
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509.public key infrastructure certificate and CRL profile
    • Network Working Group, Internet Engineering Task Force; January
    • Housley R, Ford W, Polk W, Solo D. Internet X.509.public key infrastructure certificate and CRL profile. Request for Comments 2459, Network Working Group, Internet Engineering Task Force; January 1999.
    • (1999) Request for Comments 2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 23
    • 50849117865 scopus 로고    scopus 로고
    • Information technology. Open systems interconnection
    • ITU-T Recommendation X.509. June
    • ITU-T Recommendation X.509. Information technology. Open systems interconnection. The directory: authentication framework; June 1997.
    • (1997) The Directory: Authentication Framework
  • 24
    • 8344227099 scopus 로고    scopus 로고
    • Information technology. Open systems interconnection
    • ITU-T Recommendation X.509. March
    • ITU-T Recommendation X.509. Information technology. Open systems interconnection. The directory: public-key and attribute certificate frameworks; March 2000.
    • (2000) The Directory: Public-key and Attribute Certificate Frameworks
  • 25
    • 0003237987 scopus 로고
    • The Kerberos network authentication service (V5)
    • Network Working Group, Internet Engineering Task Force; September
    • Kohl J, Neuman C. The Kerberos network authentication service (V5). Request for Comments 1510, Network Working Group, Internet Engineering Task Force; September 1993.
    • (1993) Request for Comments 1510
    • Kohl, J.1    Neuman, C.2
  • 26
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the passport single signon protocol
    • Kormann DP, Rubin AD. Risks of the passport single signon protocol. Computer Networks 2000;33:51-8.
    • (2000) Computer Networks , vol.33 , pp. 51-58
    • Kormann, D.P.1    Rubin, A.D.2
  • 32
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • Needham RM, Schroeder MD. Using encryption for authentication in large networks of computers. Communications of the ACM December 1978;21:993-9.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 36
    • 0041848577 scopus 로고    scopus 로고
    • Microsoft .NET Passport: A security analysis
    • July
    • Oppliger R. Microsoft .NET Passport: a security analysis. IEEE Computer July 2003;36(7):29-35.
    • (2003) IEEE Computer , vol.36 , Issue.7 , pp. 29-35
    • Oppliger, R.1
  • 38
    • 0003724905 scopus 로고
    • Information systems security: Scope, state-of-the-art, and evaluation of techniques
    • Pernul G. Information systems security: scope, state-of-the-art, and evaluation of techniques. International Journal of Information Management 1995;15(3):242-56.
    • (1995) International Journal of Information Management , vol.15 , Issue.3 , pp. 242-256
    • Pernul, G.1
  • 42
    • 0742292799 scopus 로고    scopus 로고
    • Internet security glossary
    • Network Working Group, Internet Engineering Task Force; May
    • Shirey R. Internet security glossary. Request for Comments 2828, Network Working Group, Internet Engineering Task Force; May 2000.
    • (2000) Request for Comments 2828
    • Shirey, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.