The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Federated environment consists of multiple domains, traditional cross domain authentication model has many defects like weak cross domain ability, overload of authentication server, cookie hidden danger and non-cross domain limitation. The paper analyzes the security risks of the current authentication model, then we propose a cross domain federal identity authentication model, which adopts the multi-agent...
At present, multi-database identity authentication is mostly based on centralized global user management mechanism. In this paper, we analyze the defects of the current identity authentication in multi-database and propose a new single sign on for multi-database identity authentication based on the idea of database union domain. Compared with the traditional methods of authentication, the scheme adopts...
In peer-to-peer network environment, there is no centralized management authority to be relied on, so the service provider and service requester have to establish some assessment model, and evaluate the dynamic behavior of others, then choose more credible trusted entities to interact. Only in this way can they ensure security, safety and reliable decisions. On the basis of EigenTrust model, a local...
We begin with overviews of the existing defects of the current Kerberos protocol and the shortage of the current improvement, and then we focus on the new method of the dynamic password and public key. On the basis of the original Kerberos protocol, firstly, we propose the usage of the Diffie-Hellman algorithm, and put the password in the token, then take the key which has added the dynamic factor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.