An Authorization Scheme Concealing Client's Access from Authentication Server.
Takamichi SaitoYuta TsunodaDaichi MiyataRyohei WatanabeYongyan ChenPublished in: IMIS (2016)
Keyphrases
- authentication mechanism
- access control
- client server
- authentication protocol
- central server
- authentication scheme
- data encryption
- cache consistency
- cache management
- mutual authentication
- access requests
- secret image sharing
- image authentication
- client server architecture
- network access
- role based access control
- security analysis
- security requirements
- remote server
- secret sharing scheme
- mobile clients
- security mechanisms
- network communication
- factor authentication
- rights management
- key distribution
- conflict resolution
- security policies
- smart card
- access control mechanism
- trust relationships
- wireless local area network
- secure communication
- public key
- cache invalidation
- outsourced databases