An overview of analysis of security standards for authentication in distributed systems.
Gemikonakli, Orhan and Eneh, Agozie (2005) An overview of analysis of security standards for authentication in distributed systems. In: Proceedings : and the proceedings of workshops: WIS '05, MSVVEIS '05, NLUCS '05, IWUC '05, WOSIS '05, CSAC '05, PRIS '05, WSMDEIS '05 and DCEIS '05 ; Miami, U.S.A., May 24 - 28, 2005. Weghorn , Hans , ed. INSTICC, Setúbal . ISBN 9789728865245
Full text is not in this repository.
Official URL: http://www.iceis.org/ICEIS2005/abstracts_2005.htm
In this paper, we present our analysis of the leading standards for authentication in distributed systems in order to illustrate the extensibility of a finite proof system initially adopted by  but could only be illustrated with Woo and Lam protocol. Our inference rule proved that Kerberos version 5 remains vulnerable in scenarios of an attacker having unlimited communication and computational power especially in a single broadcast network. This vulnerability can aid a masquerade participating in the protocol. We also prove the possibility of a masquerade attack when an intruder participates in the SAML protocol. Though our inference rule, as part of our pre-emptive protocol tool still in early stages of development, may show some analytical difficulties, it has the potential to reveal subtle flaws that may not be detected by rules of the same family.
|Item Type:||Book Section|
|Research Areas:||School of Science and Technology > Computer and Communications Engineering|
|Deposited On:||02 Apr 2009 12:41|
|Last Modified:||13 May 2014 15:37|
Repository staff only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year