Trust authentication protocol on the Web
- 29 Downloads
It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust, authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.
Key wordstrust authentication Web
CLC numberTP 309
Unable to display preview. Download preview PDF.
- Pirzada A A, McDonald C. Kerberos Assisted Authentication in Mobile Ad-hoc Networks. Castro EV, Ed.,The 27th conference on Australasian Computer Science, New Zealand, Dunedin; 2004,26: 41–46.Google Scholar
- Blake-Wilson S, Nystrom M, Hopwood D,et al. Transport Layer Security (TLS) Extensions.IETF RFC 3546,June 2003,http://www.faqs.org/rfcs.Google Scholar
- Balfanz D, Smetters D K, Stewart P,et al. Talking to strangers: authentication in Ad-hoc wireless networks.The 9th Annual Network and Distributed System Security Symposium. San Diego: California, 2002.Google Scholar
- Bussard L, Roudier Y, Molva R. Untraceable Secret Credentials: Trust Establishment with Privacy.The Second IEEE Annual Conference on Pervasive Computing and Communications Workshops Orlando: Florida, 2004, 122–126.Google Scholar
- Corradi A, Montanari R, Tibaldi D. Context-Driven Adaptation of Trust Relationships in Pervasive Collaborative Environments.The 2005 Symposium on Applications and the Internet Workshops (SAINT-W'05). Trento: Italy, 2005. 178–181.Google Scholar
- Winsborough W H, Li N. Safety in Automated Trust Negotiation.In the Proceedings of IEEE Symposium on Security and Privacy. Berkeley, California: IEEE Computer Society Press, 2004. 147–160.Google Scholar
- Hess A, Jacobson J, Mills H,et al. Advanced, Client/server Authentication in TLS.In the Network and Distributed System Security Symposium. California: San Diego, 2002.Google Scholar
- Jarvis R. Selective Disclosure of Credential Content During Trust Negotiation. [Master thesis]. Hawaii: Department of Computer Science, Brigham Young University, 2003.Google Scholar