Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Section: Collective intelligence in information systems
Guest editors: Ngoc Thanh Nguyen, Edward Szczerbicki, Bogdan Trawiński and Van Du Nguyen
Article type: Research Article
Authors: López-Fuentes, Francisco de Asís; * | Ibañez-Ramírez, Juan Alejandro | Chantes Barrios, Abigail
Affiliations: Department of Information Technology, Universidad Autónoma Metropolitana – Cuajimalpa, Av. Vasco de Quiroga 4871, Cuajimalpa, Mexico City, Mexico
Correspondence: [*] Corresponding author. Francisco de Asís López-Fuentes, Department of Information Technology, Universidad Autónoma Metropolitana – Cuajimalpa, Av. Vasco de Quiroga 4871, Cuajimalpa, 05348, Mexico City, Mexico. E-mail: flopez@correo.cua.uam.mx.
Abstract: Currently, distributed systems are used to store information in remote sites. However, these systems are exposed to different types of security risks such as virus, Trojans or ramsomware, and security mechanisms are required to protect the access to these data and guarantee their privacy and integrity. Authentication plays an important role for security issues in a computer system. Authentication is used to prove the user identity, and it is strongly related with the access control to limits the actions and operations that an authenticated user can do in a computer system. However, authentication is a previously step to the access control, and it assumes that authentication of a user has been done successfully. Several cryptography methods can be integrated in an authentication mechanism in order to obtain robust authentication schemes. An authentication scheme based on Kerberos to access data in multiples domains is presented in this paper. A challenge in our authentication scheme is related with the authentication of Kerberos servers. To deal with this problem a keys distribution architecture is added to authentication scheme in order to authenticate the Kerberos servers in a secure way.
Keywords: Security, authentication, access control, keys distribution, kerberos
DOI: 10.3233/JIFS-179365
Journal: Journal of Intelligent & Fuzzy Systems, vol. 37, no. 6, pp. 7595-7606, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl