Authentication Security for Remote Services Based on Digital Certificates
Citation
S.Anitha Jebamani "Authentication Security for Remote Services Based on Digital Certificates", International Journal of Engineering Trends and Technology (IJETT), V49(7),398-400 July 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Security plays an important role in distributed systems. Authentication is the process of verifying the identity of an individual or an object that acts on the individual`s behalf. Access control is the process of restricting access to resources or services based on an object or individual`s identity. Authentication and access control work hand in hand. Without strong authentication, unscrupulous individuals may be able to masquerade as trusted individuals. Without access control, authentication has no teeth.Authorization and access control are important in distributed applications. For example, you may want to limit the objects that are able to remotely invoke the methods of a particular server object to those objects that execute on a specific host or set of hosts, or that act on behalf of a particular individual.
Reference
1. Object-Oriented Real-Time Distributed Computing, 2001. ISORC - 2001. Proceedings. Fourth IEEE International SymposiumISBN: 0-7695-1089-2
2. “Security Considerations for Distributed Web-Based e-commerce Applications in Java” Timothy E. Lindquist, Proceedings of the 35th Hawaii International Conference on System Sciences - 2002
3. “Implementation of Socket Programming and RMI Using Simulating Environment” Hemant Kumar Srivastava, Rounak Sinha, Sumita Gupta
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN 2229-5518
Keywords
Digital signature, Remote services.