The Experts below are selected from a list of 12507 Experts worldwide ranked by ideXlab platform
Ashley Moye - One of the best experts on this subject based on the ideXlab platform.
-
ResearchGuides. Database Troubleshooting Guide. Secure Connection Errors.
2011Co-Authors: Ashley MoyeAbstract:This guide provides troubleshooting tips and solutions to the some of the most common access issues our patrons encounter, including off-campus access, authentication problems, PDF display issues, and Secure Connection errors.
-
ResearchGuides. Database Troubleshooting Guide. PDF Problems.
2011Co-Authors: Ashley MoyeAbstract:This guide provides troubleshooting tips and solutions to the some of the most common access issues our patrons encounter, including off-campus access, authentication problems, PDF display issues, and Secure Connection errors.
-
ResearchGuides. Database Troubleshooting Guide. General Information.
2011Co-Authors: Ashley MoyeAbstract:This guide provides troubleshooting tips and solutions to the some of the most common access issues our patrons encounter, including off-campus access, authentication problems, PDF display issues, and Secure Connection errors.
-
ResearchGuides. Database Troubleshooting Guide. Troubleshooting Guide for Library Staff.
2011Co-Authors: Ashley MoyeAbstract:This guide provides troubleshooting tips and solutions to the some of the most common access issues our patrons encounter, including off-campus access, authentication problems, PDF display issues, and Secure Connection errors.
-
ResearchGuides. Database Troubleshooting Guide. Common Problems.
2011Co-Authors: Ashley MoyeAbstract:This guide provides troubleshooting tips and solutions to the some of the most common access issues our patrons encounter, including off-campus access, authentication problems, PDF display issues, and Secure Connection errors.
Chengzhong Xu - One of the best experts on this subject based on the ideXlab platform.
-
a reliable Connection migration mechanism for synchronous transient communication in mobile codes
International Conference on Parallel Processing, 2004Co-Authors: Xiliang Zhong, Chengzhong XuAbstract:With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.
-
ICPP - A reliable Connection migration mechanism for synchronous transient communication in mobile codes
2004Co-Authors: Xiliang Zhong, Chengzhong XuAbstract:With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.
-
a reliable and Secure Connection migration mechanism for mobile agents
International Conference on Distributed Computing Systems Workshops, 2004Co-Authors: Xiliang Zhong, Chengzhong Xu, Haiying ShenAbstract:Connection migration in mobile systems is to support continuous and transparent communication operations between mobile agents. We present a reliable Connection migration mechanism that provides exactly-once delivery for all transmitted data during agent migration. It integrates with an agent-based access control mechanism that controls the access to network ports. To avoid frequent agent authentication and permission checking due to agent migration, a secret session key is associated with each Connection. We present the design and implementation of the mechanism, named NapletSocket in Naplet mobile agent system. It is a pure middleware implementation, requiring no modification of Java virtual machines. Evaluation results show that the NapletSocket system incurs a moderate overhead in Connection setup, mainly due to security checking. Once a Secure Connection is established, only a marginal cost is needed to pay for reliable communication during agent migration.
Eduardo B Fernandez - One of the best experts on this subject based on the ideXlab platform.
-
cipher suite rollback a misuse pattern for the ssl tls client server authentication handshake protocol
PLoP '14 Proceedings of the 21st Conference on Pattern Languages of Programs, 2014Co-Authors: Ali Alkazimi, Eduardo B FernandezAbstract:Transport Layer Security (TLS) is a cryptographic protocol that provides a Secure channel between a client and a server. TLS is the successor to the Secure Sockets Layer (SSL) protocol. The Secure Connection prevents an attacker from eavesdropping an established client-server Connection. It is used in most internet communications for enabling Secure web browsing. The SSL/TLS security protocol is layered between the application protocol layer and the TCP/IP layer and includes as one of its sub-protocols the Handshake Protocol. We present here a misuse pattern for the SSL/TLS Handshake Protocol: the Cipher Suite Rollback, where the attacker intercepts the "ClientHello" message, replaces the CipherSuite (a list of encryption algorithms), with a weak or NULL-Cipher, and passes the intercepted message to the server which will now use a weaker cipher, allowing the attacker to gain access to the exchanged data between the client and the server.
-
Cipher suite rollback: a misuse pattern for the SSL/TLS client/server authentication handshake protocol
2014Co-Authors: Ali Alkazimi, Eduardo B FernandezAbstract:Transport Layer Security (TLS) is a cryptographic protocol that provides a Secure channel between a client and a server. TLS is the successor to the Secure Sockets Layer (SSL) protocol. The Secure Connection prevents an attacker from eavesdropping an established client-server Connection. It is used in most internet communications for enabling Secure web browsing. The SSL/TLS security protocol is layered between the application protocol layer and the TCP/IP layer and includes as one of its sub-protocols the Handshake Protocol. We present here a misuse pattern for the SSL/TLS Handshake Protocol: the Cipher Suite Rollback, where the attacker intercepts the "ClientHello" message, replaces the CipherSuite (a list of encryption algorithms), with a weak or NULL-Cipher, and passes the intercepted message to the server which will now use a weaker cipher, allowing the attacker to gain access to the exchanged data between the client and the server.
Xiliang Zhong - One of the best experts on this subject based on the ideXlab platform.
-
a reliable Connection migration mechanism for synchronous transient communication in mobile codes
International Conference on Parallel Processing, 2004Co-Authors: Xiliang Zhong, Chengzhong XuAbstract:With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.
-
ICPP - A reliable Connection migration mechanism for synchronous transient communication in mobile codes
2004Co-Authors: Xiliang Zhong, Chengzhong XuAbstract:With the increasing popularity of network applications, mobile codes become a promising technology to provide scalable services. Due to their mobile nature, it is a challenge to support synchronous transient communication between mobile objects. This work presents a reliable Connection migration mechanism that allows mobile objects in communication to remain connected during their migration. This mechanism supports concurrent migration of both end-points of a Connection and guarantees exactly-once delivery of all transmitted data. In addition, a mobile code access control model is integrated to ensure Secure Connection migration. This work presents the design of the mechanism and a reference implementation, namely NapletSocket, over Java Socket in a mobile agent system. Experimental results show that NapletSocket incurs a moderate cost in Connection setup, mainly due to security checking, and marginal overhead for communication over established Connections. Furthermore, we investigate the impact of agent mobility on communication performance via simulation. Simulation results show that NapletSocket is efficient for a wide range of migration and communication patterns.
-
a reliable and Secure Connection migration mechanism for mobile agents
International Conference on Distributed Computing Systems Workshops, 2004Co-Authors: Xiliang Zhong, Chengzhong Xu, Haiying ShenAbstract:Connection migration in mobile systems is to support continuous and transparent communication operations between mobile agents. We present a reliable Connection migration mechanism that provides exactly-once delivery for all transmitted data during agent migration. It integrates with an agent-based access control mechanism that controls the access to network ports. To avoid frequent agent authentication and permission checking due to agent migration, a secret session key is associated with each Connection. We present the design and implementation of the mechanism, named NapletSocket in Naplet mobile agent system. It is a pure middleware implementation, requiring no modification of Java virtual machines. Evaluation results show that the NapletSocket system incurs a moderate overhead in Connection setup, mainly due to security checking. Once a Secure Connection is established, only a marginal cost is needed to pay for reliable communication during agent migration.
-
ICDCS Workshops - A reliable and Secure Connection migration mechanism for mobile agents
24th International Conference on Distributed Computing Systems Workshops 2004. Proceedings., 2004Co-Authors: Xiliang Zhong, Haiying ShenAbstract:Connection migration in mobile systems is to support continuous and transparent communication operations between mobile agents. We present a reliable Connection migration mechanism that provides exactly-once delivery for all transmitted data during agent migration. It integrates with an agent-based access control mechanism that controls the access to network ports. To avoid frequent agent authentication and permission checking due to agent migration, a secret session key is associated with each Connection. We present the design and implementation of the mechanism, named NapletSocket in Naplet mobile agent system. It is a pure middleware implementation, requiring no modification of Java virtual machines. Evaluation results show that the NapletSocket system incurs a moderate overhead in Connection setup, mainly due to security checking. Once a Secure Connection is established, only a marginal cost is needed to pay for reliable communication during agent migration.
M. Ohta - One of the best experts on this subject based on the ideXlab platform.
-
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2006Co-Authors: H. Morioka, H. Mano, M. Ohrnori, M. OhtaAbstract:MIS (mobile Internet services) architecture is designed for Secure Connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (mobile Internet services protocol), MISAUTHP (mobile Internet services authentication protocol) and MIS MobilelP, and two kinds of servers, authentication servers and home agent, base routers and mobile nodes. MISP is a protocol designed for authentication, IP address assignments, session key exchanges and various negotiations between mobile nodes and base routers with one-round-trip packet exchange after a mobile node receives beacons. MISP quickly establishes link between mobile nodes and base routers. MISAUTHP is a protocol for authentication between authentication servers and base routers. MISAUTHP can authenticate mobile nodes and base routers with single exchange of packets too, MIS MobilelP is a mobility support protocol for IPv4. This is a subset of RFC2002 MobileIP. We mainly describe about MISP, MISAUTHP and comparison between MISP with MISAUTHP and IEEE802.11 with IEEE802.1x
-
AINA (1) - MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06), 2006Co-Authors: H. Morioka, H. Mano, M. Ohrnori, M. OhtaAbstract:MIS (mobile Internet services) architecture is designed for Secure Connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (mobile Internet services protocol), MISAUTHP (mobile Internet services authentication protocol) and MIS MobilelP, and two kinds of servers, authentication servers and home agent, base routers and mobile nodes. MISP is a protocol designed for authentication, IP address assignments, session key exchanges and various negotiations between mobile nodes and base routers with one-round-trip packet exchange after a mobile node receives beacons. MISP quickly establishes link between mobile nodes and base routers. MISAUTHP is a protocol for authentication between authentication servers and base routers. MISAUTHP can authenticate mobile nodes and base routers with single exchange of packets too, MIS MobilelP is a mobility support protocol for IPv4. This is a subset of RFC2002 MobileIP. We mainly describe about MISP, MISAUTHP and comparison between MISP with MISAUTHP and IEEE802.11 with IEEE802.1x