Identification and authentication models analysis
Abstract
Full Text:
PDF (Russian)References
Government standard GOST R 59583-2021 Information technology. Set of standards for automated systems. Automated systems. Terms and definitions.
Government standard GOST R 51275-2006 Protection of information. Object of informatisation. Factors influencing the information. General.
Government standard GOST R 58833-2020 Information protection. Identification and authentication. General.
Government standard GOST R 54581-2011/ISO/IEC/TR15443-1:2005 Information technology. Security techniques. A framework for IT security assurance. Part 1. Overview and framework.
Walden D. C., Van Vleck T. The compatible time sharing system (1961 1973): Fiftieth anniversary commemorative overview. — IEEE Computer Society, 2011.
Government standard GOST R ISO/IEC TO 10171-98 Information technology. Telecommunication and information exchange between system. List of standard data link layer protocols that utilize high-level data link control (HDLC) classes of procedures and list of standardized XID format identifiers and private parameter set identification values.
Postel J. Internet protocol ― DARPA internet program protocol specification, RFC 791 // (No Title). — 1981.
Dierks T., Rescorla E. RFC 5246: The transport layer security (TLS) protocol version 1.2. — 2008.
Kaufman C., Hoffman P., Nir Y. et al. RFC 7296: Internet Key Exchange Protocol Version 2 (IKEv2). — 2014.
Openid connect core 1.0 / N. Sakimura, J. Bradley, M. Jones et al. // The OpenID Foundation. — 2014. — P. S3.
Abadi M., Fournet C. Private authentication // Theoretical Computer Science. — 2004. — Vol. 322, no. 3. — P. 427–476.
Randomizing RFID private authentication / Q. Yao, Y. Qi, J. Han et al. // 2009 IEEE International Conference on Pervasive Computing and Communications / IEEE. — 2009. — P. 1–10.
ISO/IEC 9798-1:2010 Information technology. Security techniques. Entity authentication. — 2010.
ISO/IEC 10181-2:1996 Information technology. Open Systems Interconnection. Security frameworks for open systems: Authentication framework. — 1996.
ISO/IEC 29115:2013 Information technology. Security techniques. Entity authentication assurance framework. — 2013.
Lloyd B., Simpson W. RFC1334: PPP Authentication Protocols. –– 1992.
Neuman C., Yu T., Hartman S., Raeburn K. RFC 4120: The Kerberos network authentication service (V5). — 2005.
Personal data exchange protocol: X / Belsky V. S., Gerasimov I. Y., Tsaregorodtsev K. D., Chizhov I. V. // International Journal of Open Information Technologies. — 2020. — Vol. 8, no. 6. — P. 1–23.
Identity-based authentication for cloud computing / H. Li, Y. Dai, L. Tian, H. Yang // Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings 1 / Springer. — 2009. — P. 157–166.
Decentralized identifiers (dids) v1. 0 / D. Reed, M. Sporny, D. Longley et al. // Draft Community Group Report. — 2020.
Digital identities and verifiable credentials / J. Sedlmeir, R. Smethurst, A. Rieger, G. Fridgen // Business & Information Systems Engineering. — 2021. — Vol. 63, no. 5. — P. 603–613.
A study of the effectiveness of usage examples in rest api documentation / S. M. Sohan, F. Maurer, C. Anslow, M. P. Robillard // 2017 IEEE symposium on visual languages and human-centric computing (VL/HCC) / IEEE. — 2017. — P. 53–61.
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162