The Improvement of HDFS Authentication Model Based on Token Push Mechanism
Abstract
References
Index Terms
- The Improvement of HDFS Authentication Model Based on Token Push Mechanism
Recommendations
An anonymous authentication mechanism based on Kerberos and HIBC
ICETC '18: Proceedings of the 10th International Conference on Education Technology and ComputersWith the development of the grid and more and more attention attached to the privacy security, there is an urgent need of a secure anonymous authentication mechanism. In order to meet this requirement, we proposed an anonymous authentication mechanism ...
New authentication concept using certificates for big data analytic tools
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and SecurityCompanies analyse large amounts of data on clusters of machines, using big data analytic tools such as Apache Spark and Apache Flink to analyse the data. Big data analytic tools are mainly tested regarding speed and reliability. Efforts about Security ...
Public-Key Cryptography Enabled Kerberos Authentication
DESE '11: Proceedings of the 2011 Developments in E-systems EngineeringKerberos is a trusted third party authentication protocol based on symmetric key cryptography. This paper studies how Kerberos authentication standard can be extended to support public key cryptography. The paper aims to do this by implementing the most ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
In-Cooperation
- Shenzhen University: Shenzhen University
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 61Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in