2010 Fifth International Conference on Digital Telecommunications 2010
DOI: 10.1109/icdt.2010.12
|View full text |Cite
|
Sign up to set email alerts
|

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

Abstract: The increase of authenticating solutions based on RADIUS servers questions the complexity of their administration whose security and confidentiality are often at fault especially within Cloud Computing architectures. More specifically, it raises the concern of server administration in a secure environment for both the granting access' company and its clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart cards built on a context of SSL smart cards. We believe … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…However, there are already research initiatives proposing identity management solutions that are heavily dependent on secure components and strong endto-end authentication, by relying and adapting protocols such as SSL and EAP-TLS [10]. The idea is that the user authentication can be done directly between the user secure element and secure elements on the server side (IdP), using end-to-end EAP-TLS communications, which can be way of eliminating vulnerabilities such as phishing attacks.…”
Section: B Identity Managementmentioning
confidence: 99%
“…However, there are already research initiatives proposing identity management solutions that are heavily dependent on secure components and strong endto-end authentication, by relying and adapting protocols such as SSL and EAP-TLS [10]. The idea is that the user authentication can be done directly between the user secure element and secure elements on the server side (IdP), using end-to-end EAP-TLS communications, which can be way of eliminating vulnerabilities such as phishing attacks.…”
Section: B Identity Managementmentioning
confidence: 99%
“…Both of these protocols can be easily modified to provide the trust assurance (requiring Note: Above mentioned measurement values for SSL are taken from [39], TLS from [40], [41] and Kerberos from [42].…”
Section: Revisiting the Requirements And Goalsmentioning
confidence: 99%
“…Urien et al, [24] proposed a SSL smart card authentication scheme that works in remote authentication dial in user service (RADIUS) protocol environment. Choudhry et al, [25] proposed a two factor smart card based authentication scheme.…”
Section: A Traditional Proposed Techniquesmentioning
confidence: 99%