Decentralized verification in a distributed system

作者: Graeme D. Baer , Gregory B. Roth

DOI:

关键词: Lightweight Extensible Authentication ProtocolDistributed computingAuthentication protocolComputer scienceData Authentication AlgorithmCredentialAccess to informationComputer access controlComputer securityAuthenticationPassword

摘要: A credential, such as a password, for an entity is used to generate multiple keys. The generated keys are distributed credential verification systems enable the perform authentication operations. that access key allows with proper subset of systems. Thus, unauthorized information by one system does not, itself, allow successful other

参考文章(195)
Martin A. Nemzow, Ron M. Redlich, Digital information infrastructure and method ,(2009)
John Stavropoulos, Jack Crystal, Alan Neuhauser, Wendell Lynch, Anand Jain, Vladimir Kuznetsov, System and method for determinimg contextual characteristics of media exposure data ,(2011)
Joseph Bjorn Ovick, Ryan Hagey, Patrick Stan, Mark Carlson, Margaret Reid, Glenn Powell, Patrick Wright, Krishna Prasad Koganti, Systems and methods to use transaction authorization communications to process offers ,(2013)
Michael Cenname, Edward Scarlett Haeger, Andrew Skowronski, Steve Elliott, Karl Schurig, Crypto Proxy for Cloud Storage Services ,(2012)
Majdi AlBadarin, Paul G. Mayfield, Xuemei Bao, Policy isolation for network authentication and authorization ,(2006)