Cain, 1995 - Google Patents

Introduction to web security

Cain, 1995

View PS
Document ID
15939917458589889008
Author
Cain A
Publication year
Publication venue
Illinois: National Center for Supercomputing

External Links

Snippet

This document provides an introduction to the issues, technologies and applications of security on the World Wide Web. The complex area of security is first decomposed into several smaller components. After a short discussion of system security issues concerning …
Continue reading at www.www-kr.org (PS) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates

Similar Documents

Publication Publication Date Title
AU2002235149B2 (en) System and method for securing a non-secure communication channel
US7100054B2 (en) Computer network security system
US7627896B2 (en) Security system providing methodology for cooperative enforcement of security policies during SSL sessions
US6985953B1 (en) System and apparatus for storage and transfer of secure data on web
CA2446304C (en) Use and generation of a session key in a secure socket layer connection
EP2020797B1 (en) Client-server Opaque token passing apparatus and method
US20080022085A1 (en) Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system
AU2002235149A1 (en) System and method for securing a non-secure communication channel
JP2004509399A (en) System for protecting objects distributed over a network
WO2018030289A1 (en) Ssl communication system, client, server, ssl communication method, and computer program
AU2005255513A1 (en) Method, system and computer program for protecting user credentials against security attacks
WO2008053279A1 (en) Logging on a user device to a server
Badra et al. Phishing attacks and solutions
Claessens et al. A tangled world wide web of security issues
Khu-Smith et al. Enhancing the security of cookies
Cain Introduction to web security
Kalla et al. Achieving non-repudiation of Web based transactions
Oreku et al. End user authentication (EUA) model and password for security
Gupta et al. Electronic banking and information assurance issues: survey and synthesis
AU2002259074B2 (en) Use and generation of a session key in a secure socket layer connection
Dridi et al. Managing Security in the World Wide Web: Architecture, Services and Techniques
Park A Secure-Cookie Recipe for Electronic Transactions
CUI et al. ENSURING SECURE COMMUNICATION FOR A DISTRIBUTED MOBILE COMPUTING SYSTEM BASED ON MICMAC
Bhaskar et al. Comparison of WWW security Protocols: Secure Sockets Layer (SSL), Transport Layer Security (TLS), & Secure HTIP (S-HTIP)
Dong et al. Security Analysis of Real World Protocols