메뉴 건너뛰기




Volumn 9, Issue 1, 2013, Pages 294-302

Security analysis of a single sign-on mechanism for distributed computer networks

Author keywords

Authentication; distributed computer networks; information security; security analysis; single sign on (SSO)

Indexed keywords

AUTHENTICATION MECHANISMS; DISTRIBUTED COMPUTER NETWORKS; IMPERSONATION ATTACK; MULTIPLE SERVICES; NETWORK SERVICES; RSA SIGNATURES; SECURITY ANALYSIS; SERVICE PROVIDER; SINGLE SIGNON; VERIFIABLE ENCRYPTIONS;

EID: 84871821096     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2012.2215877     Document Type: Article
Times cited : (43)

References (37)
  • 1
    • 0037862948 scopus 로고    scopus 로고
    • Distributing internet services to the network's edge
    • Jun
    • A. C. Weaver and M. W. Condtry, "Distributing internet services to the network's edge, " IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404-411, Jun. 2003.
    • (2003) IEEE Trans. Ind. Electron , vol.50 , Issue.3 , pp. 404-411
    • Weaver, A.C.1    Condtry, M.W.2
  • 2
    • 79956280962 scopus 로고    scopus 로고
    • JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing
    • Oct.
    • L. Barolli and F. Xhafa, "JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing, " IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2163-2172, Oct. 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.58 , Issue.6 , pp. 2163-2172
    • Barolli, L.1    Xhafa, F.2
  • 3
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, "Password authentication with insecure communication, " Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 4
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer networks
    • W. B. Lee and C. C. Chang, "User identification and key distribution maintaining anonymity for distributed computer networks, " Comput. Syst. Sci. Eng., vol. 15, no. 4, pp. 113-116, 2000.
    • (2000) Comput. Syst. Sci. Eng , vol.15 , Issue.4 , pp. 113-116
    • Lee, W.B.1    Chang, C.C.2
  • 5
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient password authenticated key agreement using smart cards
    • Jun
    • W. Juang, S. Chen, and H. Liaw, "Robust and efficient password authenticated key agreement using smart cards, " IEEE Trans. Ind. Electron., vol. 15, no. 6, pp. 2551-2556, Jun. 2008.
    • (2008) IEEE Trans. Ind. Electron , vol.15 , Issue.6 , pp. 2551-2556
    • Juang, W.1    Chen, S.2    Liaw, H.3
  • 6
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • Feb.
    • X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li, "Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards, " IEEE Trans. Ind. Electron., vol. 57, no. 2, pp. 793-800, Feb. 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.57 , Issue.2 , pp. 793-800
    • Li, X.1    Qiu, W.2    Zheng, D.3    Chen, K.4    Li, J.5
  • 7
    • 79951577827 scopus 로고    scopus 로고
    • Formal vulnerability analysis of a security system for remote fieldbus access
    • Feb.
    • M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access, " IEEE Trans. Ind. Inf., vol. 7, no. 1, pp. 30-40, Feb. 2011.
    • (2011) IEEE Trans. Ind. Inf , vol.7 , Issue.1 , pp. 30-40
    • Cheminod, M.1    Pironti, A.2    Sisto, R.3
  • 8
    • 84871964962 scopus 로고    scopus 로고
    • Review of security issues in industrial networks
    • DOI 10. 1109/TII/20122198666
    • A. Valenzano, L. Durante, and M. Cheminod, "Review of security issues in industrial networks, " IEEE Trans. Ind. Inf., vol. PP, no. 99, 2012, DOI 10. 1109/TII/2012. 2198666.
    • (2012) IEEE Trans. Ind. Inf. , vol.PP , Issue.99
    • Valenzano, A.1    Durante, L.2    Cheminod, M.3
  • 9
    • 1542335490 scopus 로고    scopus 로고
    • Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    • T.-S. Wu and C.-L. Hsu, "Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks, " Comput. Security, vol. 23, no. 2, pp. 120-125, 2004.
    • (2004) Comput. Security , vol.23 , Issue.2 , pp. 120-125
    • Wu, T.-S.1    Hsu, C.-L.2
  • 10
    • 10644225185 scopus 로고    scopus 로고
    • New efficient user identification and key distribution scheme providing enhanced security
    • Y. Yang, S. Wang, F. Bao, J. Wang, and R. H. Deng, "New efficient user identification and key distribution scheme providing enhanced security, " Comput. Security, vol. 23, no. 8, pp. 697-704, 2004.
    • (2004) Comput. Security , vol.23 , Issue.8 , pp. 697-704
    • Yang, Y.1    Wang, S.2    Bao, F.3    Wang, J.4    Deng, R.H.5
  • 11
    • 33748125161 scopus 로고    scopus 로고
    • A secure identification and key agreement protocol with user anonymity (SIKA)
    • K. V. Mangipudi and R. S. Katti, "A secure identification and key agreement protocol with user anonymity (SIKA), " Comput. Security, vol. 25, no. 6, pp. 420-425, 2006.
    • (2006) Comput. Security , vol.25 , Issue.6 , pp. 420-425
    • Mangipudi, K.V.1    Katti, R.S.2
  • 12
    • 56949092341 scopus 로고    scopus 로고
    • A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
    • C.-L. Hsu and Y.-H. Chuang, "A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks, " Inf. Sci., vol. 179, no. 4, pp. 422-429, 2009.
    • (2009) Inf. Sci , vol.179 , Issue.4 , pp. 422-429
    • Hsu, C.-L.1    Chuang, Y.-H.2
  • 13
    • 84864549429 scopus 로고    scopus 로고
    • A server independent authentication scheme for RFID systems
    • Aug.
    • B. Wang and M. Ma, "A server independent authentication scheme for RFID systems, " IEEE Trans. Ind. Inf., vol. 8, no. 3, pp. 689-696, Aug. 2012.
    • (2012) IEEE Trans. Ind. Inf , vol.8 , Issue.3 , pp. 689-696
    • Wang, B.1    Ma, M.2
  • 14
    • 84862274466 scopus 로고    scopus 로고
    • SHARDIS: A privacy-enhanced discovery service for RFID-based product information
    • Aug.
    • B. Fabian, T. Ermakova, and C. Muller, "SHARDIS: A privacy-enhanced discovery service for RFID-based product information, " IEEE Trans. Ind. Inf., vol. 8, no. 3, pp. 707-718, Aug. 2012.
    • (2012) IEEE Trans. Ind. Inf , vol.8 , Issue.3 , pp. 707-718
    • Fabian, B.1    Ermakova, T.2    Muller, C.3
  • 15
    • 84863343959 scopus 로고    scopus 로고
    • OPass: A user authentication protocol resistant to password stealing and password reuse attacks
    • Apr.
    • H.-M. Sun, Y.-H. Chen, and Y.-H. Lin, "oPass: A user authentication protocol resistant to password stealing and password reuse attacks, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 651-663, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 651-663
    • Sun, H.-M.1    Chen, Y.-H.2    Lin, Y.-H.3
  • 16
    • 84871813799 scopus 로고    scopus 로고
    • Security forumon single sign-on
    • "Security Forumon Single Sign-On, " TheOpenGroup [Online]. Available: http://www. opengroup. org/security/l2-sso. htm
    • TheOpenGroup
  • 17
    • 84867290573 scopus 로고    scopus 로고
    • A generic construction of dynamic single sign-on with strong security
    • Springer
    • J. Han, Y. Mu, W. Susilo, and J. Yan, "A generic construction of dynamic single sign-on with strong security, " in Proc. SecureComm', 2010, pp. 181-198, Springer.
    • (2010) Proc. SecureComm , pp. 181-198
    • Han, J.1    Mu, Y.2    Susilo, W.3    Yan, J.4
  • 18
    • 79960556311 scopus 로고    scopus 로고
    • Generalized digital certificate for user authentication and key establishment for secure communications
    • Jul.
    • L. Harn and J. Ren, "Generalized digital certificate for user authentication and key establishment for secure communications, " IEEE Trans. Wireless Commun., vol. 10, no. 7, pp. 2372-2379, Jul. 2011.
    • (2011) IEEE Trans. Wireless Commun , vol.10 , Issue.7 , pp. 2372-2379
    • Harn, L.1    Ren, J.2
  • 19
    • 80053654561 scopus 로고    scopus 로고
    • A secure single sign-on mechanism for distributed computer networks
    • Jan.
    • C.-C. Chang and C.-Y. Lee, "A secure single sign-on mechanism for distributed computer networks, " IEEE Trans. Ind. Electron., vol. 59, no. 1, pp. 629-637, Jan. 2012.
    • (2012) IEEE Trans. Ind. Electron , vol.59 , Issue.1 , pp. 629-637
    • Chang, C.-C.1    Lee, C.-Y.2
  • 20
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • U. Feige, A. Fiat, and A. Shamir, "Zero-knowledge proofs of identity, " J. Crytography, vol. 1, no. 2, pp. 77-94, 1988.
    • (1988) J. Crytography , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Fiat, A.2    Shamir, A.3
  • 21
    • 3142585398 scopus 로고    scopus 로고
    • Verifiable encryption of digital signatures and applications
    • G. Ateniese, "Verifiable encryption of digital signatures and applications, " ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 1-20, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur , vol.7 , Issue.1 , pp. 1-20
    • Ateniese, G.1
  • 25
    • 0347824705 scopus 로고    scopus 로고
    • PKCS #1 v2 1, RSA Cryptography Standard, Draft 2, PKCS
    • Public Key Cryptography Standards, PKCS #1 v2. 1, RSA Cryptography Standard, Draft 2, PKCS, 2001 [Online]. Available: http://www. rsasecurity. com/rsalabs/pkcs/
    • (2001) Public Key Cryptography Standards
  • 26
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the RSA cryptosystem
    • D. Boneh, "Twenty years of attacks on the RSA cryptosystem, " Notices Amer. Math. Soc., vol. 46, no. 2, pp. 203-213, 1999.
    • (1999) Notices Amer. Math. Soc , vol.46 , Issue.2 , pp. 203-213
    • Boneh, D.1
  • 27
    • 84871793257 scopus 로고    scopus 로고
    • Wikipedia, RSA (algorithm) [Online]. Available: http://en. wikipedia. org/wiki/RSA-(algorithm)
    • Wikipedia RSA (Algorithm)
  • 30
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution, " in Proc. of CRYPTO', 1993, pp. 232-249.
    • (1993) Proc. of CRYPTO , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 31
    • 84958778419 scopus 로고
    • On a limitation of BAN Logic
    • C. Boyd and W. Mao, "On a limitation of BAN Logic, " in Proc. of EUROCRYPT, 1994, pp. 240-247.
    • (1994) Proc. of EUROCRYPT , pp. 240-247
    • Boyd, C.1    Mao, W.2
  • 32
    • 0033750375 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • Apr
    • N. Asokan, V. Shoup, and M. Waidner, "Optimistic fair exchange of digital signatures, " IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 591-606, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun , vol.18 , Issue.4 , pp. 591-606
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 33
    • 84948967686 scopus 로고    scopus 로고
    • Confirmer signature schemes secure against adaptive adversaries
    • J. Camenisch and M. Michels, "Confirmer signature schemes secure against adaptive adversaries, " in Proc. EUROCRYPT, 2000, pp. 243-258.
    • (2000) Proc. EUROCRYPT , pp. 243-258
    • Camenisch, J.1    Michels, M.2
  • 34
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme, " in Proc. CRYPTO, 2000, pp. 255-270.
    • (2000) Proc. CRYPTO , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 35
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • D. Chaum and T. P. Pedersen, "Wallet databases with observers, " in Proc. of CRYPTO, 1993, pp. 89-105.
    • (1993) Proc. of CRYPTO , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 37
    • 84868090556 scopus 로고    scopus 로고
    • Provably secure single sign-on scheme in distributed systems and networks
    • Jun
    • J. Yu, G. Wang, and Y. Mu, "Provably secure single sign-on scheme in distributed systems and networks, " in Proc. 11th IEEE TrustCom, Jun. 2012, pp. 271-278.
    • (2012) Proc. 11th IEEE TrustCom , pp. 271-278
    • Yu, J.1    Wang, G.2    Mu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.