Academic literature on the topic 'Delegated authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Delegated authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Delegated authentication"

1

Khan, Mohsin, Philip Ginzboorg, and Valtteri Niemi. "AKMA: Delegated Authentication System of 5G." IEEE Communications Standards Magazine 5, no. 3 (2021): 56–61. http://dx.doi.org/10.1109/mcomstd.101.2100015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loiselle, Mirka. "Multiple Authority Delegation in Art Authentication." Scientonomy: Journal for the Science of Science 1 (May 19, 2017): 41–53. http://dx.doi.org/10.33137/js.v1i0.28233.

Full text
Abstract:
In this paper, I expand upon the research on authority delegation begun by Overgaard and myself in our 2016 paper Authority Delegation. I argue that singular authority delegation – in which a community delegates authority over a given topic to a single expert community – should be distinguished from cases of multiple authority delegation. A community engages in multiple authority delegation iff that community delegates authority over a given topic to more than one expert community. Furthermore, multiple authority delegation can be further divided into two types: hierarchical and non-hierarchical. I examine two cases of authority delegation in the art market and argue that these cases model instances of hierarchical authority delegation.Suggested Modifications[Sciento-2017-0007]: Accept the following definitions of subtypes of authority delegation: Singular authority delegation ≡ community A is said to engage in a relationship of singular authority delegation over topic x iff community A delegates authority over topic x to exactly one community.Multiple authority delegation ≡ community A is said to engage in a relationship of multiple authority delegation over topic x iff community A delegates authority over topic x to more than one community. Hierarchical authority delegation ≡ a sub-type of multiple authority delegation where different communities are delegated different degrees of authority over topic x.Non-hierarchical authority delegation ≡ a sub-type of multiple authority delegation where different communities are delegated the same degree of authority over topic x. [Sciento-2017-0008]: Accept the following reconstruction of the contemporary authority delegation structure in the art market regarding the works of Monet: A work claimed to be by Monet is authentic if it is considered authentic by the Wildenstein Institute.[Sciento-2017-0009]: Accept the following reconstruction of the contemporary authority delegation structure in the art market regarding the works of Picasso: A work claimed to be by Picasso is authentic if it is has been certified as authentic by both Maya Widmaier-Picasso and Claude Ruiz-Picasso.[Sciento-2017-0010]: Accept the following reconstruction of the authority delegation structure in the art market regarding the works of Modigliani between 1997 and 2015: A work claimed to be by Modigliani is authentic iff (1) it is in the Ceroni catalogue raisonné or (2) if it is not in catalogue and has been certified as authentic by Marc Restellini.[Sciento-2017-0011]: Accept the following reconstruction of the contemporary authority delegation structure in the art market regarding the works of Renoir: A work claimed to be by Renoir is authentic iff (1) it has been certified as authentic by the Wildenstein institute or (2) it has not been dismissed by the Wildenstein institute and it is included in the Bernheim-Jeune catalogue.
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.098292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Qun, Jianzhong Li, and Xuechang Ren. "A provably secure delegated authentication scheme and its applications." International Journal of Embedded Systems 11, no. 2 (2019): 139. http://dx.doi.org/10.1504/ijes.2019.10019710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chien, Hung-Yu, and Tzu-Hang Hsu. "Secure fast WLAN handoff using time-bound delegated authentication." International Journal of Communication Systems 22, no. 5 (2009): 565–84. http://dx.doi.org/10.1002/dac.983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Lei, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, and Kaoru Ota. "MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing." Security and Communication Networks 9, no. 16 (2016): 3777–89. http://dx.doi.org/10.1002/sec.1490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, JoonYoung, MyeongHyun Kim, JiHyeon Oh, YoungHo Park, KiSung Park, and Sungkee Noh. "A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service." Applied Sciences 11, no. 19 (2021): 8841. http://dx.doi.org/10.3390/app11198841.

Full text
Abstract:
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, the cloud server has privacy issues, including personal information and requires the help of a Trusted Third Party (TTP) for data sharing. However, because the amount of data generated and value increases, the data owner who produces data must become the subject of data sharing. In this study, we use key aggregate searchable encryption (KASE) technology, which enables keyword search, to efficiently share data without using TTP. The traditional KASE scheme approach only discusses delegation of authority from the data owner to another user. However, if the delegated entity cannot perform time-critical tasks because the shared data are unavailable, the delegate must further delegate the rights given to other users. Consequently, this paper proposes a new KASE scheme that enables multi-delegation without TTP and includes an authentication technique between the user and the server. After that, we perform informal and formal analysis using BAN logic and AVISPA for security evaluation, and compare the security and performance aspects with existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
8

Dumitru, Ionuț Cătălin, and Mihai Togan. "Client Module with Multifactor Authentication for Remote Electronic Signature Generation Using Cryptography API: Next Generation." Journal of Military Technology 3, no. 1 (2020): 5–10. http://dx.doi.org/10.32754/jmt.2020.1.01.

Full text
Abstract:
In classic PKI systems, users resorted to cryptographic devices like smartcard or electronic-token to perform the required cryptographic operations, therefore all cryptographic operations will be done in a safe environment. Although a widely-accepted and highly-efficient method, along with the evolution of technology, it is also desirable to simplify user experience with the applications and at the same time to reduce costs. Thus, there is the problem of cryptographic devices and passwords needing to be retained and secret. To overcome all these impediments, we introduce the concept of remote signing, a concept that will simplify the signature generation process, and also increase security to the whole process while lowering costs for equipment. Therefore, by the fact that the signature generation process will be delegated to a remote service, the possibility of generating errors due to the client system is minimized, the need for a cryptographic device for users is eliminated. At the same time, the entire computational effort is also delegated to the remote service, which means an increased computing speed, and by the fact that the cryptographic devices that generate the signature are located at distance, there is also the possibility of physical securing and limiting unauthorized access.
APA, Harvard, Vancouver, ISO, and other styles
9

Park, Jun-Cheol. "Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality." Korean Institute of Smart Media 11, no. 10 (2022): 76–88. http://dx.doi.org/10.30693/smj.2022.11.10.76.

Full text
Abstract:
Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user’s smartphone to store any authentication credential or personal information of its owner.
APA, Harvard, Vancouver, ISO, and other styles
10

Pavlov, Andrey S., Nikolay Yu Svistunov, Vyacheslav I. Petrenko, Fariza B. Tebueva, Vladimir V. Kopytov, and Evgeniy N. Tishchenko. "PROTOCOL FOR THE DELEGATED AUTHENTICATION OF NEW AGENTS WHEN THE NUMBER OF AGENTS IS SCALING IN SWARMING ROBOT SYSTEMS." Вестник ВГУ Серия Системный анализ и информационные технологии, no. 4 (2022): 23–38. http://dx.doi.org/10.17308/sait/1995-5499/2022/4/23-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Delegated authentication"

1

Delignat-Lavaud, Antoine. "On the security of authentication protocols on the web." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE018/document.

Full text
Abstract:
Est-il possible de démontrer un théorème prouvant que l’accès aux données confidentielles d’un utilisateur d’un service Web (tel que GMail) nécessite la connaissance de son mot de passe, en supposant certaines hypothèses sur ce qu’un attaquant est incapable de faire (par exemple, casser des primitives cryptographiques ou accéder directement aux bases de données de Google), sans toutefois le restreindre au point d’exclure des attaques possibles en pratique?Il existe plusieurs facteurs spécifiques aux protocoles du Web qui rendent impossible une application directe des méthodes et outils existants issus du domaine de l’analyse des protocoles cryptographiques.Tout d’abord, les capacités d’un attaquant sur le Web vont largement au-delà de la simple manipulation des messages échangés entre le client et le serveur sur le réseau. Par exemple, il est tout à fait possible (et même fréquent en pratique) que l’utilisateur ait dans son navigateur un onglet contenant un site contrôlé par l’adversaire pendant qu’il se connecte à sa messagerie (par exemple, via une bannière publicitaire) ; cet onglet est, comme n’importe quel autre site, capable de provoquer l’envoi de requêtes arbitraires vers le serveur de GMail, bien que la politique d’isolation des pages du navigateur empêche la lecture directe de la réponse à ces requêtes. De plus, la procédure pour se connecter à GMail implique un empilement complexe de protocoles : tout d’abord, un canal chiffré, et dont le serveur est authentifié, est établi avec le protocole TLS ; puis, une session HTTP est créée en utilisant un cookie ; enfin, le navigateur exécute le code JavaScript retourné par le client, qui se charge de demander son mot de passe à l’utilisateur.Enfin, même en imaginant que la conception de ce système soit sûre, il suffit d’une erreur minime de programmation (par exemple, une simple instruction goto mal placée) pour que la sécurité de l’ensemble de l’édifice s’effondre.Le but de cette thèse est de bâtir un ensemble d’outils et de librairies permettant de programmer et d’analyser formellement de manière compositionelle la sécurité d’applicationsWeb confrontées à un modère plausible des capacités actuelles d’un attaquant sur le Web. Dans cette optique, nous étudions la conception des divers protocoles utilisés à chaque niveau de l’infrastructure du Web (TLS, X.509, HTTP, HTML, JavaScript) et évaluons leurs compositions respectives. Nous nous intéressons aussi aux implémentations existantes et en créons de nouvelles que nous prouvons correctes afin de servir de référence lors de comparaisons. Nos travaux mettent au jour un grand nombre de vulnérabilités aussi bien dans les protocoles que dans leurs implémentations, ainsi que dans les navigateurs, serveurs, et sites internet ; plusieurs de ces failles ont été reconnues d’importance critiques. Enfin, ces découvertes ont eu une influence sur les versions actuelles et futures du protocole TLS<br>As ever more private user data gets stored on the Web, ensuring proper protection of this data (in particular when it transits through untrusted networks, or when it is accessed by the user from her browser) becomes increasingly critical. However, in order to formally prove that, for instance, email from GMail can only be accessed by knowing the user’s password, assuming some reasonable set of assumptions about what an attacker cannot do (e.g. he cannot break AES encryption), one must precisely understand the security properties of many complex protocols and standards (including DNS, TLS, X.509, HTTP, HTML,JavaScript), and more importantly, the composite security goals of the complete Web stack.In addition to this compositional security challenge, onemust account for the powerful additional attacker capabilities that are specific to the Web, besides the usual tampering of network messages. For instance, a user may browse a malicious pages while keeping an active GMail session in a tab; this page is allowed to trigger arbitrary, implicitly authenticated requests to GMail using JavaScript (even though the isolation policy of the browser may prevent it from reading the response). An attacker may also inject himself into honest page (for instance, as a malicious advertising script, or exploiting a data sanitization flaw), get the user to click bad links, or try to impersonate other pages.Besides the attacker, the protocols and applications are themselves a lot more complex than typical examples from the protocol analysis literature. Logging into GMail already requires multiple TLS sessions and HTTP requests between (at least) three principals, representing dozens of atomic messages. Hence, ad hoc models and hand written proofs do not scale to the complexity of Web protocols, mandating the use of advanced verification automation and modeling tools.Lastly, even assuming that the design of GMail is indeed secure against such an attacker, any single programming bug may completely undermine the security of the whole system. Therefore, in addition to modeling protocols based on their specification, it is necessary to evaluate implementations in order to achieve practical security.The goal of this thesis is to develop new tools and methods that can serve as the foundation towards an extensive compositional Web security analysis framework that could be used to implement and formally verify applications against a reasonably extensive model of attacker capabilities on the Web. To this end, we investigate the design of Web protocols at various levels (TLS, HTTP, HTML, JavaScript) and evaluate their composition using a broad range of formal methods, including symbolic protocol models, type systems, model extraction, and type-based program verification. We also analyze current implementations and develop some new verified versions to run tests against. We uncover a broad range of vulnerabilities in protocols and their implementations, and propose countermeasures that we formally verify, some of which have been implemented in browsers and by various websites. For instance, the Triple Handshake attack we discovered required a protocol fix (RFC 7627), and influenced the design of the new version 1.3 of the TLS protocol
APA, Harvard, Vancouver, ISO, and other styles
2

Sbai, Anass. "Contributions au proxy de re-chiffrement et à la délégation d'authentification." Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0032.

Full text
Abstract:
La cyber sécurité est un enjeu majeur pour le SmartGrid et les industries énergétiques. La manipulation des données issues des compteurs intelligents peut avoir des conséquences néfastes, particulièrement lorsque les systèmes de comptage sont connectés directement aux sources de production. Dans le cadre du projet VertPom, nous nous sommes intéressés à deux problématiques majeures : la confidentialité des données de consommation et les systèmes d'authentification. Pour répondre aux problématiques de confidentialité, nous avons utilisé le concept des proxy de re-chiffrement (PRE) qui permet le partage de données chiffrées. Nous avons étudié les systèmes existants et nous nous sommes intéressés aux constructions bénéficiant d'une sécurité CCA dans le modèle standard qui n'utilisent pas le couplage. Nous montrons l'existence d'une vulnérabilité dans un PRE existant puis nous proposons une nouvelle construction basée sur le système de chiffrement de Cramer-Shoup. Nous définissons aussi la notion de PREaaS (Proxy Re-Encryption as a Service) qui permet une utilisation dans un contexte orienté services. S'agissant des problématiques d'authentification, nous présentons un nouveau protocole de délégation d'authentification. Notre solution permet aux utilisateurs de, s'authentifier anonymement sur des réseaux non sécurisés, de manière asynchrone sans communication directe entre les différents acteurs, tout en minimisant le nombre d'interactions<br>Cybersecurity is a major issue for the SmartGrid and energy industries. Manipulating data collected from smart meters can have harmful consequences, especially when the metering systems are connected directly to the production sources. Within the scope of the VertPom project, we have addressed two major issues: the confidentiality of consumption data and authentication systems. To address the confidentiality issues, we used the concept of proxy re-encryption (PRE) which allows the sharing of encrypted data. We have studied existing systems and we are interested in constructions with CCA security in the standard model without pairing. We show the existence of a vulnerability in an existing PRE and we propose a new construction based on the Cramer-Shoup encryption system. We also define the notion of PREaaS (Proxy Re-Encryption as a Service) which allows use in a service-oriented context. Regarding authentication issues, we present a new authentication delegation protocol. Our solution allows users to anonymously authenticate themselves on unsecured networks, asynchronously without direct communication between the different actors, while minimizing the number of interactions
APA, Harvard, Vancouver, ISO, and other styles
3

Odyurt, Uraz. "Evaluation of Single Sign-On Frameworks, as a Flexible Authorization Solution : OAuth 2.0 Authorization Framework." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37097.

Full text
Abstract:
This work introduces the available authorization frameworks for the purpose of Single Sign-On functionality within an enterprise, along with the fundamental technicalities. The focus of the work is on SAML 2.0 and OAuth 2.0 frame- works. Following the details related to available protocol flows, supported client profiles and security considerations, the two frameworks are compared in accordance with a set of factors given in a criteria. The report discusses the possibilities provided by a Microsoft Windows based infrastructure, as well as different scenarios and their feasibility in an enterprise environment. The preferred framework, OAuth 2.0, is selected according to the given criteria and the comparative discussions.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Po-Shen, and 劉柏伸. "A Study on RFID Authentication and RFID Delegated-Authentication Application." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41755985866189428843.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>97<br>In this paper, we propose two kinds of designs based on the RFID system, including an improved secure RFID authentication protocol and a novel RFID-based DRM system for disc renting. Our first protocol is designed to refine and improve the RFID authentication protocol proposed by Wang et al. in 2007. Our protocol not only keeps the advantage of high authentication efficiency, but also improves the drawbacks in their design. Our proposal contributes a practical and more secure design in current RFID infrastructures. The other protocol is a new design for disc renting inspired by the RFID-based DRM system proposed by Lan et al. in 2006. With the RFID system, their design can verify the genuineness of discs and restrict the playing limit in order to prevent illegally disc playing and copy. However, there exists some problems in their design. Under the consideration of disc renting with more business opportunities, we propose a novel online disc renting system. Our system is not only a reasonable DRM mechanism but also has the features of security and convenience. And it will be a win-win design for the rental business and the consumers.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Delegated authentication"

1

Jessup, Andrew, Henrique Z. Cochak, Guilherme P. Koslovski, et al. "DVID: Adding Delegated Authentication to SPIFFE Trusted Domains." In Advanced Information Networking and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57916-5_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wei, Lifei, Lei Zhang, Kai Zhang, and Mianxiong Dong. "An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud." In Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21837-3_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alimomeni, Mohsen, and Reihaneh Safavi-Naini. "How to Prevent to Delegate Authentication." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28865-9_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marwan, Mbarek, Ali Kartit, and Hassan Ouahmane. "A Framework to Secure Medical Image Storage in Cloud Computing Environment." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch016.

Full text
Abstract:
Nowadays, modern healthcare providers create massive medical images every day because of the recent progress in imaging tools. This is generally due to the increasing number of patients demanding medical services. This has resulted in a continuous demand of a large storage space. Unfortunately, healthcare domains still use local data centers for storing medical data and managing business processes. This has significant negative impacts on operating costs associated with licensing fees and maintenance. To overcome these challenges, healthcare organizations are interested in adopting cloud storage rather than on-premise hosted solutions. This is mainly justified by the scalability, cost savings and availability of cloud services. The primary objective of this model is to outsource data and delegate IT computations to an external party. The latter delivers needed storage systems via the Internet to fulfill client's demands. Even though this model provides significant cost advantages, using cloud storage raises security challenges. To this aim, this article describes several solutions which were proposed to ensure data protection. The existing implementations suffer from many limitations. The authors propose a framework to secure the storage of medical images over cloud computing. In this regard, they use multi-region segmentation and watermarking techniques to maintain both confidentiality and integrity. In addition, they rely on an ABAC model to ensure access control to cloud storage. This solution mainly includes four functions, i.e., (1) split data for privacy protection, (2) authentication for medical dataset accessing, (3) integrity checking, and (4) access control to enforce security measures. Hence, the proposal is an appropriate solution to meet privacy requirements.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Delegated authentication"

1

Sbai, Anass, Cyril Drocourt, and Gilles Dequen. "A New Delegated Authentication Protocol based on PRE." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010542404680478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sbai, Anass, Cyril Drocourt, and Gilles Dequen. "A New Delegated Authentication Protocol based on PRE." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010542400002998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yoon, Daegeun, Taejoong Chung, and Yongdae Kim. "Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials." In ACSAC '23: Annual Computer Security Applications Conference. ACM, 2023. http://dx.doi.org/10.1145/3627106.3627144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liang, Jinjin, Jian Jiang, Haixin Duan, Kang Li, Tao Wan, and Jianping Wu. "When HTTPS Meets CDN: A Case of Authentication in Delegated Service." In 2014 IEEE Symposium on Security and Privacy (SP). IEEE, 2014. http://dx.doi.org/10.1109/sp.2014.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beltran, Victoria, and Antonio F. Skarmeta. "An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE)." In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 2016. http://dx.doi.org/10.1109/wf-iot.2016.7845482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Ribao, and Dingfeng Ye. "Delegate predicate encryption and its application to anonymous authentication." In the 4th International Symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!