Improving multi-tier security using redundant authentication.
Jodie P. BoyerRagib HasanLars E. OlsonNikita BorisovCarl A. GunterDavid RailaPublished in: CSAW (2007)
Keyphrases
- multi tier
- security mechanisms
- security requirements
- service management
- user authentication
- database management
- authentication protocol
- intrusion detection
- security issues
- information security
- access control
- virtual private network
- network management
- security policies
- smart card
- security level
- end to end
- nested transactions