Skip to main content

Low-cost secure server connection with limited-privilege clients

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

  • 117 Accesses

Abstract

In this paper we describe a low-cost method of establishing a secure client-server connection. A commonly used Web procedure is to establish a secure link and then authenticate the client. By reversing the order and authenticating the client before the secure connection is established, we save resources of the server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Uri Blumenthal and Bert Wijnen, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), RFC2274, January 1998.

    Google Scholar 

  2. Uri Blumenthal, N. C. Hien, Bert Wijnen, Remote Key Update in SNMPv3, Proceedings of IEEE SICON'98, to appear.

    Google Scholar 

  3. David Flanagan, Java in a Nutshell, O'Reilly Publishing, 1997. ISBN 1-56592-304-9.

    Google Scholar 

  4. H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC2104, February 1997.

    Google Scholar 

  5. Gary McGraw and Edward Feiten, Java Security, Wiley Computer Publishing, 1997.ISBN 0-471-17842-X.

    Google Scholar 

  6. A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997. ISBN 0-8493-8523-7.

    Google Scholar 

  7. Bruce Schneier, Applied Cryptography, 2nd edition. John Wiley and Sons, 1996. ISBN 0-471-12845-7.

    Google Scholar 

  8. R. Thayer, N. Doraswamy, R. Glenn, IP Security Document Roadmap, Internet Draft, November 1997. http://ds.internic.net/internat-drafts/draft-ietf-ipsec-doc-roadmap-02.txt

    Google Scholar 

  9. Cryptix Development Team, International Java Cryptographic Extensions, 1998. http://www.systemics.com/software/cryptix-java/

    Google Scholar 

  10. FIPS 180-1: Secure Hash Standard, NIST, April 1995.

    Google Scholar 

  11. Java Home Page, http://java.sun.com

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blumenthal, U., Hien, N.C., Rooney, J.H. (1998). Low-cost secure server connection with limited-privilege clients. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053724

Download citation

  • DOI: https://doi.org/10.1007/BFb0053724

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics