메뉴 건너뛰기




Volumn 6, Issue 2, 2012, Pages 93-101

Ladon: End-to-end authorisation support for resource-deprived environments

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SERVERS; COMMUNICATION OVERHEADS; FORMAL VALIDATION; KERBEROS; KEY DISTRIBUTION; PAIR-WISE KEYS; PERFORMANCE ANALYSIS; SECURITY ANALYSIS; SECURITY GOALS; SECURITY PROTOCOLS;

EID: 84863560791     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs.2010.0259     Document Type: Article
Times cited : (19)

References (20)
  • 1
    • 77954519992 scopus 로고    scopus 로고
    • An integration framework for sensor networks and data stream management systems
    • Toronto, Canada, August
    • Abadi, D.J., Lindner, W., Madden, S., and Schuler, J.: ' An integration framework for sensor networks and data stream management systems ', Proc. 13th Int. Conf. Very Large Data Bases, Toronto, Canada, August, 2004, p. 1361-1364
    • (2004) Proc. 13th Int. Conf. Very Large Data Bases , pp. 1361-1364
    • Abadi, D.J.1    Lindner, W.2    Madden, S.3    Schuler, J.4
  • 2
    • 84863569554 scopus 로고    scopus 로고
    • IPv6 over Low power WPAN (6lowpan) Working Group accessed September 2011
    • IPv6 over Low power WPAN (6lowpan) Working Group, http://datatracker. ietf.org/wg/6lowpan/charter/, accessed September 2011
  • 4
    • 33750963358 scopus 로고    scopus 로고
    • The Kerberos network authentication service (v5)
    • Neuman, C., Hartman, S., and Raeburn, K.: ' The Kerberos network authentication service (v5) ', RFC 4120, 2005
    • (2005) RFC 4120
    • Neuman, C.1    Hartman, S.2    Raeburn, K.3
  • 5
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • Zhu, S., Setia, S., and Jajodia, S.: ' LEAP: efficient security mechanisms for large-scale distributed sensor networks ', Proc. Tenth ACM Conf. Computer and Communications Security (CCS' 03), Washington D.C., USA, October, 2003, p. 62-72 (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 6
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • 10.1023/A:1016598314198
    • Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., and Culler, D.E.: ' SPINS: security protocols for sensor networks ', ACM Wirel. Netw., 2002, 8, (5), p. 521-534 10.1023/A:1016598314198
    • (2002) ACM Wirel. Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 8
    • 0002494222 scopus 로고
    • A nonce-based protocol for multiple authentications
    • 10.1145/142854.142872
    • Kehne, A., Schönwälder, J., and Langendörfer, H.: ' A nonce-based protocol for multiple authentications ', ACM SIGOPS Oper. Syst. Rev., 1992, 26, (4), p. 84-89 10.1145/142854.142872
    • (1992) ACM SIGOPS Oper. Syst. Rev. , vol.26 , Issue.4 , pp. 84-89
    • Kehne, A.1    Schönwälder, J.2    Langendörfer, H.3
  • 9
    • 0002088427 scopus 로고
    • A note on the use of timestamps as nonces
    • 10.1145/155848.155852 0163-5980
    • Neuman, B.C., and Stubblebine, S.G.: ' A note on the use of timestamps as nonces ', Oper. Syst. Rev., 1993, 27, (2), p. 10-14 10.1145/155848.155852 0163-5980
    • (1993) Oper. Syst. Rev. , vol.27 , Issue.2 , pp. 10-14
    • Neuman, B.C.1    Stubblebine, S.G.2
  • 10
    • 0028466968 scopus 로고
    • SESAME: The solution to security for open distributed systems
    • 10.1016/0140-3664(94)90105-8
    • Kaijser, P., Parker, T., and Pinkas, D.: ' SESAME: the solution to security for open distributed systems ', Comput. Commun., 1994, 17, (7), p. 501-518 10.1016/0140-3664(94)90105-8
    • (1994) Comput. Commun. , vol.17 , Issue.7 , pp. 501-518
    • Kaijser, P.1    Parker, T.2    Pinkas, D.3
  • 12
    • 0027316628 scopus 로고
    • Proxy-based authorization and accounting for distributed systems
    • Pittsburgh, USA, May
    • Neuman, C.: ' Proxy-based authorization and accounting for distributed systems ', Proc. 13th Int. Conf. Distributed Computing Systems, Pittsburgh, USA, May, 1993, p. 283-291
    • (1993) Proc. 13th Int. Conf. Distributed Computing Systems , pp. 283-291
    • Neuman, C.1
  • 13
    • 84863578134 scopus 로고    scopus 로고
    • Windows 2000 Advantage Magazine
    • Walla, M.: ' Kerberos explained ', 2000, Windows 2000 Advantage Magazine
    • (2000) Kerberos Explained
    • Walla, M.1
  • 16
    • 84992227458 scopus 로고    scopus 로고
    • Proposed NIST standard for role-based access control
    • 10.1145/501978.501980 1094-9224
    • Ferriarolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D., and Chandramouli, R.: ' Proposed NIST standard for role-based access control ', ACM Trans. Inf. Syst. Secur., 2001, 4, (3), p. 224-274 10.1145/501978.501980 1094-9224
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 224-274
    • Ferriarolo, D.F.1    Sandhu, R.2    Gavrila, S.3    Kuhn, D.4    Chandramouli, R.5
  • 18
    • 33646227667 scopus 로고    scopus 로고
    • Automated security protocol analysis with the AVISPA tool
    • 10.1016/j.entcs.2005.11.052 1571-0661
    • Viganò, L.: ' Automated security protocol analysis with the AVISPA tool ', Electron. Notes Theor. Comput. Sci., 2006, 155, p. 61-86 10.1016/j.entcs.2005.11.052 1571-0661
    • (2006) Electron. Notes Theor. Comput. Sci. , vol.155 , pp. 61-86
    • Viganò, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.