hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.17559/TV-20151114105745

A distributed authentication architecture and protocol

Kristian Skračić ; Sveučilište u Zagrebu, Fakultet elektrotehnike i računarstva, Unska 3, 10 000 Zagreb, Croatia
Predrag Pale ; Sveučilište u Zagrebu, Fakultet elektrotehnike i računarstva, Unska 3, 10 000 Zagreb, Croatia
Branko Jeren ; Sveučilište u Zagrebu, Fakultet elektrotehnike i računarstva, Unska 3, 10 000 Zagreb, Croatia

Puni tekst: engleski, pdf (529 KB) str. 303-311 preuzimanja: 516* citiraj
APA 6th Edition
Skračić, K., Pale, P. i Jeren, B. (2017). A distributed authentication architecture and protocol. Tehnički vjesnik, 24 (Supplement 2), 303-311. https://doi.org/10.17559/TV-20151114105745
MLA 8th Edition
Skračić, Kristian, et al. "A distributed authentication architecture and protocol." Tehnički vjesnik, vol. 24, br. Supplement 2, 2017, str. 303-311. https://doi.org/10.17559/TV-20151114105745. Citirano 12.11.2019.
Chicago 17th Edition
Skračić, Kristian, Predrag Pale i Branko Jeren. "A distributed authentication architecture and protocol." Tehnički vjesnik 24, br. Supplement 2 (2017): 303-311. https://doi.org/10.17559/TV-20151114105745
Harvard
Skračić, K., Pale, P., i Jeren, B. (2017). 'A distributed authentication architecture and protocol', Tehnički vjesnik, 24(Supplement 2), str. 303-311. https://doi.org/10.17559/TV-20151114105745
Vancouver
Skračić K, Pale P, Jeren B. A distributed authentication architecture and protocol. Tehnički vjesnik [Internet]. 2017 [pristupljeno 12.11.2019.];24(Supplement 2):303-311. https://doi.org/10.17559/TV-20151114105745
IEEE
K. Skračić, P. Pale i B. Jeren, "A distributed authentication architecture and protocol", Tehnički vjesnik, vol.24, br. Supplement 2, str. 303-311, 2017. [Online]. https://doi.org/10.17559/TV-20151114105745
Puni tekst: hrvatski, pdf (529 KB) str. 303-311 preuzimanja: 85* citiraj
APA 6th Edition
Skračić, K., Pale, P. i Jeren, B. (2017). Arhitektura i protokol za raspodijeljenu autentifikaciju korisnika. Tehnički vjesnik, 24 (Supplement 2), 303-311. https://doi.org/10.17559/TV-20151114105745
MLA 8th Edition
Skračić, Kristian, et al. "Arhitektura i protokol za raspodijeljenu autentifikaciju korisnika." Tehnički vjesnik, vol. 24, br. Supplement 2, 2017, str. 303-311. https://doi.org/10.17559/TV-20151114105745. Citirano 12.11.2019.
Chicago 17th Edition
Skračić, Kristian, Predrag Pale i Branko Jeren. "Arhitektura i protokol za raspodijeljenu autentifikaciju korisnika." Tehnički vjesnik 24, br. Supplement 2 (2017): 303-311. https://doi.org/10.17559/TV-20151114105745
Harvard
Skračić, K., Pale, P., i Jeren, B. (2017). 'Arhitektura i protokol za raspodijeljenu autentifikaciju korisnika', Tehnički vjesnik, 24(Supplement 2), str. 303-311. https://doi.org/10.17559/TV-20151114105745
Vancouver
Skračić K, Pale P, Jeren B. Arhitektura i protokol za raspodijeljenu autentifikaciju korisnika. Tehnički vjesnik [Internet]. 2017 [pristupljeno 12.11.2019.];24(Supplement 2):303-311. https://doi.org/10.17559/TV-20151114105745
IEEE
K. Skračić, P. Pale i B. Jeren, "Arhitektura i protokol za raspodijeljenu autentifikaciju korisnika", Tehnički vjesnik, vol.24, br. Supplement 2, str. 303-311, 2017. [Online]. https://doi.org/10.17559/TV-20151114105745

Sažetak
Most user authentication methods rely on a single verifier being stored at a central location within the information system. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users’ digital identities if the verifier can be extracted from the system. This paper proposes a distributed authentication environment in which there is no such single point of compromise. We propose an architecture that does not rely on a single verifier to authenticate users, but rather a distributed authentication architecture where several authentication servers are used to authenticate a user. We consider an authentication environment in which the user authentication process is distributed among independent servers. Each server independently performs its own authentication of the user, for example by asking the user to complete a challenge in order to prove his claim to a digital identity. The proposed architecture allows each server to use any authentication factor. We provide a security analysis of the proposed architecture and protocol, which shows they are secure against the attacks chosen in the analysis.

Ključne riječi
authentication factors; digital identity; distributed authentication architecture; distributed authentication protocol; distributed user authentication

Hrčak ID: 186069

URI
https://hrcak.srce.hr/186069

[hrvatski]

Posjeta: 754 *