scholarly journals Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS)

Author(s):  
M. Chiba ◽  
G. Dommety ◽  
M. Eklund ◽  
D. Mitton ◽  
B. Aboba
2003 ◽  
Author(s):  
M. Chiba ◽  
G. Dommety ◽  
M. Eklund ◽  
D. Mitton ◽  
B. Aboba

2009 ◽  
Vol 29 (4) ◽  
pp. 950-951
Author(s):  
Xin ZHANG ◽  
Fang-wei LI ◽  
Chun-lan PAN

Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


Author(s):  
Johan Muliadi Kerta ◽  
Panji Adiprabowo ◽  
Eva Kusmiyati ◽  
Sylvia Astri Wulandari Rahardjo

Using various applications needs more than one authentication or user and password to login. Users in BPPT found this problem on their network application. Implementation of Single Sign On can help users to use only one authentication for many applications. Therefore a research is conducted to design and implement Single Sign On system that simplify and facilitate the user's email account to access application. Data are collected from literature study, system observation, and interviews while the design uses Network Development Life Cycle (NDLC) method. The research results in a Single Sign On system that utilizez Lightweight Directory Access Protocol (LDAP). In addition, Remote Authentication Dial-In User Service (RADIUS) is managed in accordance with the needs of the institution. Single Sign On system designed runs well and is able to provide conveniences for the user to use the services of existing applications, as it provides a standard email address to the user's identity. It also helps administrators to perform control of users trying to login. 


Author(s):  
Ismail Puji Saputra ◽  
Ridwan Yusuf ◽  
Usep Saprudin

Banyaknya pengguna internet pada suatu tempat atau instansi menimbulkan sebuah antrian yang menyebabkan sulitnya pengguna dalam mengakses internet. Berdasarkan masalah tersebut penulis mengimplementasikan cloud computing sebagai radius server pada jaringan internet dengan menggunakan Router MikroTik sebagai alat manajemen bandwith, RADIUS (Remote Authentication Dial-In User Service) server akan dibangun didalam server Ubuntu dengan memanfaatkan service cloud computing dari AWS (Amazon WEB Service), selain sebagai RADIUS server, Dengan adanya RADIUS server yang dibangun dengan cloud computing dan Router MikroTik stabilitas jaringan internet pada suatu tempat atau instansi menjadi lebih baik dan proses manajemen pengguna menjadi mudah.


2012 ◽  
Vol 263-266 ◽  
pp. 1461-1466
Author(s):  
Xiao Ming Meng ◽  
Jian Hua Zhang

Focus on the problem of dynamic authorization access control of Distributed Multi-Organization Management Information System (DMOMIS), the system resources are divided into two kinds: relatively independent resources and shared resources. These two kinds of resources were used different authorization system to authorize. The relatively independent resources were authorized by using distributed authorization system (DA), and the similar and shared resources were authorized by using authorized system (A). According to the key terms definition, the system hypothesis and the idea of dynamic programming, then the dynamic authorization access control process of DMOMIS was abstracted as a multi stage users authorization process based on resources, and put out the dynamic authorization access control strategy model of DMOMIS, at last, depicted its execution process.


Sign in / Sign up

Export Citation Format

Share Document