Show simple item record

dc.contributor.advisorFulp, J. D.
dc.contributor.advisorHuffmire, Ted
dc.contributor.authorChia, Wan Yin.
dc.date.accessioned2012-03-14T17:41:41Z
dc.date.available2012-03-14T17:41:41Z
dc.date.issued2009-12
dc.identifier.urihttps://hdl.handle.net/10945/4375
dc.description.abstractAuthentication is a fundamental aspect of information security in enabling the authenticity of the source of information to be determined. Among several electronic authentication mechanisms available today, deploying the right authentication mechanism will protect information against its envisaged threat(s) in the designated operating environment. This study attempts to create a taxonomy (classification) for current operational authentication protocols, and show how the taxonomy could help to determine the appropriate protocol to meet a particular operating environment's authentication needs. The approach used in this study's taxonomy development was to perform functional decomposition of the protocol in terms of the functionality it provides, the mechanisms it utilizes, and the key elements in facilitating its operation. This enabled a breaking-down into the fundamental building blocks of what makes up the protocol. The development of the taxonomy in this way enabled different perspectives and analyses of the protocols' capabilities and their applicability. The basic idea of authentication via proof of possession of a secret, whether it is symmetric or asymmetric, applies for all categories of authentication protocols under study. Several use cases are put forth illustrating how the classification can be leveraged to facilitate analysis of the applicability of the protocol for implementation in a given targeted environment.en_US
dc.description.urihttp://archive.org/details/theclassificatio109454375
dc.format.extentxviii, 73 p. : ill. ;en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.subject.lcshComputer networksen_US
dc.subject.lcshSecurity measuresen_US
dc.subject.lcshAuthenticationen_US
dc.titleThe classification of e-authentication protocols for targeted applicabilityen_US
dc.typeThesisen_US
dc.contributor.corporateNaval Postgraduate School (U.S.)
dc.description.serviceSingapore Defence Science Technology Agency author (civilian).en_US
dc.identifier.oclc503116231
etd.thesisdegree.nameM.S.en_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.verifiednoen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record