loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: H. A. Eneh and O. Gemikonakli

Affiliation: School of Computing Science, Middlesex University, United Kingdom

Abstract: In this paper, we present our analysis of the leading standards for authentication in distributed systems and the inference rule used for our analysis. The inference rule here is similar to that used in the finite proof system of [3] and thus, is of the same family. However the rule of [3] can only reveal vulnerabilities of simpler protocols similar to Woo and Lam. Our inference rule proved that Kerberos version 5 remains vulnerable in scenarios of an attacker having reasonable communication and computational power especially in a single broadcast network. This vulnerability can aid a masquerade participating in the protocol. We also prove the possibility of a masquerade attack when an intruder participates in the SAML protocol. Though our inference rule, as part of our pre-emptive protocol tool is still in early stages of development, it has the potential to reveal subtle flaws that may not be detected by inference rules of the same family.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.222.125.171

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
A. Eneh, H. and Gemikonakli, O. (2005). An Approach for the Analysis of Security Standards for Authentication in Distributed Systems. In Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS; ISBN 972-8865-25-2, SciTePress, pages 21-30. DOI: 10.5220/0002574600210030

@conference{wosis05,
author={H. {A. Eneh}. and O. Gemikonakli.},
title={An Approach for the Analysis of Security Standards for Authentication in Distributed Systems},
booktitle={Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS},
year={2005},
pages={21-30},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002574600210030},
isbn={972-8865-25-2},
}

TY - CONF

JO - Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS
TI - An Approach for the Analysis of Security Standards for Authentication in Distributed Systems
SN - 972-8865-25-2
AU - A. Eneh, H.
AU - Gemikonakli, O.
PY - 2005
SP - 21
EP - 30
DO - 10.5220/0002574600210030
PB - SciTePress