Attributes | Values |
---|
rdf:type
| |
Description
| - This paper presents strong authentication in information systems that is currently used. Techniques for raising a security rate are introduced. Based on the techniques a general model of a security infrastructure is designed. The main goal is building of a real infrastructure, its validation and description of the whole authentication process, where two-level, two-factor and mutual authentication are used. Authentication mediums are certificates stored into security storages. The whole authentication process is described in detail and network analyses are also given. We focus on user operations during the whole authentication process and we give comparison of our solution with a traditional authentication process. We discuss security issues in our solution. Open Source Software is used for our purposes, but commercial software is also mentioned because the aim is a solution independent of a platform of operating systems.
- This paper presents strong authentication in information systems that is currently used. Techniques for raising a security rate are introduced. Based on the techniques a general model of a security infrastructure is designed. The main goal is building of a real infrastructure, its validation and description of the whole authentication process, where two-level, two-factor and mutual authentication are used. Authentication mediums are certificates stored into security storages. The whole authentication process is described in detail and network analyses are also given. We focus on user operations during the whole authentication process and we give comparison of our solution with a traditional authentication process. We discuss security issues in our solution. Open Source Software is used for our purposes, but commercial software is also mentioned because the aim is a solution independent of a platform of operating systems. (en)
|
Title
| - Strong Authentication Designed for Web-based Services
- Strong Authentication Designed for Web-based Services (en)
|
skos:prefLabel
| - Strong Authentication Designed for Web-based Services
- Strong Authentication Designed for Web-based Services (en)
|
skos:notation
| - RIV/00216305:26220/11:PU91098!RIV11-MSM-26220___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| - P(FR-TI2/679), Z(MSM0021630513)
|
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26220/11:PU91098
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Alfresco, certificates, GNU/Linux, mutual authentication, Open Source Software, OpenSC, OpenSSL, SafeNet iKey 3000, two-factor authentication, two-level authentication, web-based services (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the 6th International Conference on Teleinformatics - ICT 2011
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Doležel, Radek
- Hošek, Jiří
- Pedersen, Jens Myrup
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Vysoké učení technické v Brně
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |