Cain, 1995 - Google Patents
Introduction to web securityCain, 1995
View PS- Document ID
- 15939917458589889008
- Author
- Cain A
- Publication year
- Publication venue
- Illinois: National Center for Supercomputing
External Links
Snippet
This document provides an introduction to the issues, technologies and applications of security on the World Wide Web. The complex area of security is first decomposed into several smaller components. After a short discussion of system security issues concerning …
- 238000005516 engineering process 0 abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2002235149B2 (en) | System and method for securing a non-secure communication channel | |
US7100054B2 (en) | Computer network security system | |
US7627896B2 (en) | Security system providing methodology for cooperative enforcement of security policies during SSL sessions | |
US6985953B1 (en) | System and apparatus for storage and transfer of secure data on web | |
CA2446304C (en) | Use and generation of a session key in a secure socket layer connection | |
EP2020797B1 (en) | Client-server Opaque token passing apparatus and method | |
US20080022085A1 (en) | Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system | |
AU2002235149A1 (en) | System and method for securing a non-secure communication channel | |
JP2004509399A (en) | System for protecting objects distributed over a network | |
WO2018030289A1 (en) | Ssl communication system, client, server, ssl communication method, and computer program | |
AU2005255513A1 (en) | Method, system and computer program for protecting user credentials against security attacks | |
WO2008053279A1 (en) | Logging on a user device to a server | |
Badra et al. | Phishing attacks and solutions | |
Claessens et al. | A tangled world wide web of security issues | |
Khu-Smith et al. | Enhancing the security of cookies | |
Cain | Introduction to web security | |
Kalla et al. | Achieving non-repudiation of Web based transactions | |
Oreku et al. | End user authentication (EUA) model and password for security | |
Gupta et al. | Electronic banking and information assurance issues: survey and synthesis | |
AU2002259074B2 (en) | Use and generation of a session key in a secure socket layer connection | |
Dridi et al. | Managing Security in the World Wide Web: Architecture, Services and Techniques | |
Park | A Secure-Cookie Recipe for Electronic Transactions | |
CUI et al. | ENSURING SECURE COMMUNICATION FOR A DISTRIBUTED MOBILE COMPUTING SYSTEM BASED ON MICMAC | |
Bhaskar et al. | Comparison of WWW security Protocols: Secure Sockets Layer (SSL), Transport Layer Security (TLS), & Secure HTIP (S-HTIP) | |
Dong et al. | Security Analysis of Real World Protocols |