[go: up one dir, main page]

Jensen, 1998 - Google Patents

Secure software architectures

Jensen, 1998

Document ID
1246594986504637712
Author
Jensen C
Publication year
Publication venue
Proceedings of the Eighth Nordic Workshop on Programming Environment Research

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Loscocco et al. The inevitability of failure: The flawed assumption of security in modern computing environments
Bittau et al. Wedge: Splitting applications into reduced-privilege compartments
US6836888B1 (en) System for reverse sandboxing
US5864683A (en) System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
CA2439446C (en) Method and system for server support for pluggable authorization systems
US6289462B1 (en) Trusted compartmentalized computer operating system
US7360097B2 (en) System providing methodology for securing interfaces of executable files
US8700532B2 (en) Information sharing system, computer, project managing server, and information sharing method used in them
DE69731714T2 (en) Dynamic service classes for an international cryptographic structure
US20030177376A1 (en) Framework for maintaining information security in computer networks
US20110296164A1 (en) System and method for providing secure network services
US7469417B2 (en) Infrastructure method and system for authenticated dynamic security domain boundary extension
Lang et al. Developing secure distributed systems with CORBA
Jensen Secure software architectures
Karp et al. The client utility architecture: the precursor to E-speak
Skoularidou et al. Security architectures for network clients
Tsiligiridis Security for mobile agents: privileges and state appraisal mechanism
Botha Information Security in the client/server environment
Ghosh Enhancement in security of framework for mobile cloud computational offloading
Neron et al. A formal security model of a smart card web server
Turner et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor
Meeson et al. Analysis of Secure Wrapping Technologies.
Westphall et al. JaCoWeb Security-A CORBA Security Discretionary Prototype
Wong PGP Enhancement to Java Applet
Singaravelu et al. A Secure Middleware Architecture for Web Services