Search
Now showing items 1-6 of 6
Roles and rights
(University of Hertfordshire, 1995)
In this paper we describe and discuss a protection model designed by Coulouris and Dollimore to protect objects which are shared by different principals participating in a co-operative task. We then show that the ...
Authentication v Certification
(University of Hertfordshire, 1995)
Authentication servers and certification authorities are usually viewed simply as alternative ways of providing the same service. In this paper we show that the differences in the natures of these two approaches are more ...
Nested signature blocks
(University of Hertfordshire, 1995)
For any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as ...
Key-spoofing attacks on nested signature blocks
(1995)
For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ...
Self authenticating proxies
(University of Hertfordshire, 1994)
Authentication and access control are usually implemented as two separate protection mechanisms because they are logically separate functions. A consistent approach to both of these functions is proposed in this paper. In ...
Technique for authentication, access control and resource management in open distributed systems
(1994)
A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism ...