透過您的圖書館登入
IP:3.139.97.157

並列摘要


Sharing on networks is common nowadays. There are many sites, and users typically must register for an account on each site. Sometimes, sites or services can communicate or share data with each other or cooperate to perform some functions together. Such intercommunication between sites uses a shared network. However, some sites may not be trusted, and the user’s own data, especially passwords, might be exposed or fraudulent. Authentication is needed in order to both identify users and to hide user information via some authorization policies. In this paper, we describe a method for authentication via sessions. This authentication procedure is able to provide authentication of proxies and also allow concealed passwords. It is a little like OpenID^1 for websites, which prevents hacks and attacks from malicious servers and allows ordinary network connections. Moreover, it also allows proxy-proving, which permits only registered servers to be agents of a requesting user to request data from other servers.

參考文獻


D. Recordon, and D. Reed, OpenID 2.0: A platform for user-centric identity management. In M. Winslett and A. Goto (Eds.), Proceedings of the second ACM workshop on Digital identity management (p11-16). New York, NY, USA: ACM Press. 2006. http://dx.doi.org/10.1145/1179529.1179532.
E. Maler, and D. Reed, The venn of identity: Options and issues in federated identity management. IEEE Security and Privacy, 6(2), p16-23, 2008. http://dx.doi.org/10.1109/MSP.2008.50
H. Wang, C. Fan, S. Yang, J. Zou, and X. Zhang, A new secure OpenID authentication mechanism using one-time password (OTP). Paper Presented at the 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Wuhan, September 23-25, 2011. http://dx.doi.org/10.1109/wicom.2011.6040525
E. Hammer-Lahav, The OAuth 1.0 protocol, IETF. Retrieved on January 18, 2013, from http://tools.ietf.org/html/rfc5849
T. Berners-Lee, J. Hendler, O. Lassila, The semantic web. Scientific American, 284(5), p34-43, 2001.

被引用紀錄


張人文(2018)。虛實整合之加工精度與效能優化智能監控系統〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201800112
王貫宇(2017)。複合指標加工參數優化及刀具臨界壽命監控智慧系統整合研究〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201700911
李軍逸(2017)。CNC 工具機產效暨與節能同步優化設計與空刀率之智能監測研究〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201700110
Wang, T. Y. (2013). 基於類別代數的點對點本體資料庫 [doctoral dissertation, National Chung Cheng University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201613534160
Hsieh, C. H. (2014). 人工智慧個人助理之設計與實作 [doctoral dissertation, National Chung Cheng University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201613585917

延伸閱讀