The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The websites of the modern Web integrate content from multiple parties to provide an enriched user experience. The so-called single sign-on forms part of this integration whereby a relying website enables a user to use her credentials on a third-party provider (such as Google or Facebook) to authenticate with itself and, if desired, authorize itself to use her resources on the provider. The user benefits...
Single sign-on (SSO) is an identity management technique that provides users the ability to use multiple Web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot access Web services, even if the services are operating normally. Therefore, enabling continuous use is important in single sign on. In this paper, we present security framework...
Internet standards development requires consideration of security issues in the protocols. But what does “security” mean in this context? We often conflate several different aspects into the blanket term “security.” Here, the author looks at some of these aspects separately.
This paper describes a new approach for developing and implementing an advanced authentication method within active directory network services. For advance authentication process a new type of user multi-factor authentication based on the classical three-factor authentication extended by the position information and time is described in this paper. The main objectives of our applied research are extended...
To conquer the problems existing in access control mechanisms available nowadays, such as how to manage the access authorities of the users and the protected resources, and how to keep the confidential data from visiting and modifying illegally, a new access control mechanism called multi-device TBPM-RBAC (MD-TBPM-RBAC) is proposed in this paper. According to the demand for unified users management...
In the specification of trusted platform module (TPM), object-independent authorization protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are many TPM manufacturers having made their own TPM. However, some of the TPM manufacturers don't implement the TPM completely according to the specification of TPM. In this paper, BAN...
Computer greatly influences our educational environment. Over the last years, automatic computer examination systems have been widely used for computer-based tests. But these systems are based on traditional question-answer examination style which is not fit for the sequenced test. The sequenced test should consider the context of the examinee, e.g. the order of questions or the permissions of the...
The paper deals with the area of user authentication. This service is fundamental for present networks and their security so we start with modern AAA (Authentication, Authorization and Accounting) protocol analysis. As a result of current state and protocol analysis we identify main problems in the field of user authentication - insufficient flexibility and therefore lack of security. These properties...
Current state-of-the art solutions for online banking authentication and identity management include methods for re-authenticating users via out-of-band channels for each transaction. SMS-based schemes belong to this category, and can provide strong authentication to protect against security attacks. Poor usability of these schemes is still a problem, which makes them vulnerable to other obvious attacks...
Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security...
This paper discusses a security mechanism for an inter-device communication paradigm. Future networked devices interact with each other and a federation of devices will provide some useful services to users. This paper first introduces the inter-device communication paradigm and prospective industrial applications. This paper shows technical features and security problems on the inter-device communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.