Smith, 2000 - Google Patents
WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web InteractionsSmith, 2000
View PDF- Document ID
- 10273413398124725045
- Author
- Smith S
- Publication year
- Publication venue
- Research Report
External Links
Snippet
This report describes a project that aims to fill two gaps in recent security and privacy research. The first gap is trust. Too often,“security of Web transactions” reduces to “encryption of the channel”—and neglects to address what happens at the server on the …
- 230000002708 enhancing 0 title abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmed et al. | Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey | |
Poritz et al. | Property attestation—scalable and privacy-friendly security assessment of peer computers | |
CN105659559B (en) | Verifying security of a remote server | |
Claessens et al. | (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions | |
van Oorschot | Computer Security and the Internet | |
US7194759B1 (en) | Used trusted co-servers to enhance security of web interaction | |
Cabrera-Gutiérrez et al. | Integration of hardware security modules and permissioned blockchain in industrial iot networks | |
Patel et al. | DAuth: A decentralized web authentication system using Ethereum based blockchain | |
KR20070122502A (en) | Computer-readable media, methods, and systems for performing hardware function scans for device authentication | |
Wilhelm et al. | A pessimistic approach to trust in mobile agent platforms | |
Leicher et al. | Implementation of a trusted ticket system | |
Khattak et al. | Analysis of open environment sign-in schemes-privacy enhanced & trustworthy approach | |
Talib et al. | Ontology-based cyber security policy implementation in Saudi Arabia | |
Mohammed et al. | Secure smart contract based on blockchain to prevent the non-repudiation phenomenon | |
Sharma et al. | A two-tier security solution for storing data across public cloud | |
Alansari | A blockchain-based approach for secure, transparent and accountable personal data sharing | |
Smith | Webalps: A survey of e-commerce privacy and security applications | |
Smith | WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web Interactions | |
Naidu et al. | Efficient smart contract for privacy preserving authentication in blockchain using zero knowledge proof | |
Xie et al. | VOAuth: A solution to protect OAuth against phishing | |
Schell et al. | Platform security: what is lacking? | |
Hu et al. | EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System. | |
Palacios et al. | AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework with Oblivious Smart Contracts | |
Mihailescu et al. | Cryptanalysis Attacks and Techniques | |
Brandl | Trusted computing: The tcg trusted platform module specification |