Advanced Search

    HUANG Jian-hua~*, SONG Guo-xin. Application of Intrusion Tolerant Techniques to Authentication System[J]. Journal of East China University of Science and Technology, 2005, (3): 350-353412.
    Citation: HUANG Jian-hua~*, SONG Guo-xin. Application of Intrusion Tolerant Techniques to Authentication System[J]. Journal of East China University of Science and Technology, 2005, (3): 350-353412.

    Application of Intrusion Tolerant Techniques to Authentication System

    • In combination with a scalable intrusion tolerance architecture for distributed service (SITAR) and intrusion tolerant password authentication system(ITPAS), this paper describes an architecture of distributed password authentication system which is intrusion tolerant. Intrusion tolerance and prevention of dictionary attacks are realized by means of redundancy, diversity, proxy, secret sharing, and distributed intrusion detection techniques.
    • loading

    Catalog

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return