Towards Secure and Dependable Authentication and Authorization Infrastructures.
Diego KreutzAlysson Neves BessaniEduardo FeitosaHugo CunhaPublished in: PRDC (2014)
Keyphrases
- security requirements
- access control
- security mechanisms
- identity management
- security analysis
- authentication mechanism
- user authentication
- password authentication
- authentication protocol
- authentication scheme
- rights management
- security policies
- smart card
- key distribution
- data encryption
- security properties
- security model
- integrity verification
- factor authentication
- data security
- secure manner
- fault tolerant
- access control policies
- information security
- rbac model
- trust negotiation
- data management
- role based access control
- encryption decryption
- trust relationships
- key agreement
- distributed systems
- key exchange protocol
- security protocols
- mutual authentication
- electronic payment
- public key cryptography
- secure communication
- security services
- conflict resolution
- access requests
- image authentication
- security issues
- wireless sensor networks
- secret key