Secure enterprise information system a mutual authentication scheme for roaming users using memorable information

被引:0
作者
Yang, Lin [1 ]
Ruan, Xinghua [1 ]
Xu, Jingdong [1 ]
Wu, Gongyi [1 ]
机构
[1] Nankai Univ, Coll Informat Tech Sci, Tianjin 300071, Peoples R China
来源
RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS II, VOL 1 | 2008年 / 254卷
关键词
enterprise information systems; security; privacy; trust; password; mutual authentication; identity-based cryptography;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
In enterprise information systems, personal mobility provides the ability for roaming users to access enterprise network services from anywhere at anytime. However, methods for mutual authentication between roaming user and servers are still far from satisfied. In this paper, we focus on such a mutual authentication scheme, by which users can only use memorable information to log in servers with confidence. The scheme is designed in a threshold fashion to improve system's availability and robustness. It can resist known attacks, such as replay attack, password guessing attack and verifier stolen attack. We believe this scheme is suitable for enterprise computing scenarios, in which network environments are confidential and closed.
引用
收藏
页码:195 / +
页数:3
相关论文
共 7 条
[1]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[2]  
BONEH D, 2001, LNCS, V2139
[3]  
Chen XJ, 2005, Proceedings of the International Conference on Mechanical Engineering and Mechanics 2005, Vols 1 and 2, P973
[4]  
FORK W, 2000, P 9 INT WORKSH EN TE, P176
[5]  
Jablon DP, 2001, LECT NOTES COMPUT SC, V2020, P344
[6]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[7]  
YANG L, MUTUAL AUTHENTICATIO