Nothing Special   »   [go: up one dir, main page]

Smith, 2000 - Google Patents

WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web Interactions

Smith, 2000

View PDF
Document ID
10273413398124725045
Author
Smith S
Publication year
Publication venue
Research Report

External Links

Snippet

This report describes a project that aims to fill two gaps in recent security and privacy research. The first gap is trust. Too often,“security of Web transactions” reduces to “encryption of the channel”—and neglects to address what happens at the server on the …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer

Similar Documents

Publication Publication Date Title
Ahmed et al. Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey
Poritz et al. Property attestation—scalable and privacy-friendly security assessment of peer computers
CN105659559B (en) Verifying security of a remote server
Claessens et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions
van Oorschot Computer Security and the Internet
US7194759B1 (en) Used trusted co-servers to enhance security of web interaction
Cabrera-Gutiérrez et al. Integration of hardware security modules and permissioned blockchain in industrial iot networks
Patel et al. DAuth: A decentralized web authentication system using Ethereum based blockchain
KR20070122502A (en) Computer-readable media, methods, and systems for performing hardware function scans for device authentication
Wilhelm et al. A pessimistic approach to trust in mobile agent platforms
Leicher et al. Implementation of a trusted ticket system
Khattak et al. Analysis of open environment sign-in schemes-privacy enhanced & trustworthy approach
Talib et al. Ontology-based cyber security policy implementation in Saudi Arabia
Mohammed et al. Secure smart contract based on blockchain to prevent the non-repudiation phenomenon
Sharma et al. A two-tier security solution for storing data across public cloud
Alansari A blockchain-based approach for secure, transparent and accountable personal data sharing
Smith Webalps: A survey of e-commerce privacy and security applications
Smith WebALPS: Using Trusted Co-Servers to Enhance Privacy and Security of Web Interactions
Naidu et al. Efficient smart contract for privacy preserving authentication in blockchain using zero knowledge proof
Xie et al. VOAuth: A solution to protect OAuth against phishing
Schell et al. Platform security: what is lacking?
Hu et al. EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System.
Palacios et al. AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework with Oblivious Smart Contracts
Mihailescu et al. Cryptanalysis Attacks and Techniques
Brandl Trusted computing: The tcg trusted platform module specification