The classification of e-authentication protocols for targeted applicability
dc.contributor.advisor | Fulp, J. D. | |
dc.contributor.advisor | Huffmire, Ted | |
dc.contributor.author | Chia, Wan Yin. | |
dc.date.accessioned | 2012-03-14T17:41:41Z | |
dc.date.available | 2012-03-14T17:41:41Z | |
dc.date.issued | 2009-12 | |
dc.identifier.uri | https://hdl.handle.net/10945/4375 | |
dc.description.abstract | Authentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the right authentication mechanism will protect information against its envisaged threat(s) in the designated operating environment. This study attempts to create a taxonomy (classification) for current operational authentication protocols, and show how the taxonomy could help to determine the appropriate protocol to meet a particular operating environment's authentication needs. The approach used in this study's taxonomy development was to perform functional decomposition of the protocol in terms of the functionality it provides, the mechanisms it utilizes, and the key elements in facilitating its operation. This enabled a breaking-down into the fundamental building blocks of what makes up the protocol. The development of the taxonomy in this way enabled different perspectives and analyses of the protocols' capabilities and their applicability. The basic idea of authentication via proof of possession of a secret, whether it is symmetric or asymmetric, applies for all categories of authentication protocols under study. Several use cases are put forth illustrating how the classification can be leveraged to facilitate analysis of the applicability of the protocol for implementation in a given targeted environment. | en_US |
dc.description.uri | http://archive.org/details/theclassificatio109454375 | |
dc.format.extent | xviii, 73 p. : ill. ; | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.subject.lcsh | Computer networks | en_US |
dc.subject.lcsh | Security measures | en_US |
dc.subject.lcsh | Authentication | en_US |
dc.title | The classification of e-authentication protocols for targeted applicability | en_US |
dc.type | Thesis | en_US |
dc.contributor.corporate | Naval Postgraduate School (U.S.) | |
dc.description.service | Singapore Defence Science Technology Agency author (civilian). | en_US |
dc.identifier.oclc | 503116231 | |
etd.thesisdegree.name | M.S. | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
etd.verified | no | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.