Top Flaws in Distributed Authentication Systems and how they are Attacked

Top Flaws in Distributed Authentication Systems and how they are Attacked

Loading
Loading Social Plug-ins...
Language: English
Save to myLibrary Download PDF
Go to Page # Page of 64

Description: Common Flaws of and Attacks on Distributed Authentication Systems, Kerberos, PKIX, XML security, SAML, WebServices, JSON for OAuth, OpenID, new protocol creators, Platform libraries, Authentication in Distributed Systems, Confused Deputies Abound.

 
Author: Brad Hill (Fellow) | Visits: 1320 | Page Views: 3831
Domain:  High Tech Category: IT Subcategory: Security 
Upload Date:
Link Back:
Short URL: http://www.wesrch.com/electronics/pdfEL11TZ3XNMONP
Loading
Loading...



px *        px *

* Default width and height in pixels. Change it to your required dimensions.

 
Contents:
Common Flaws of and Attacks on Distributed Authentication Systems
An "OWASP Top Ten" for enterprise and federated identity systems

Insert presenter logo here on slide master. See hidden slide 2 for directions

What was done with Kerberos and PKIX Was re-invented with XML security, SAML and WebServices

Is being re-invented again in JSON for OAuth, OpenID, etc.

Insert presenter logo here on slide master. See hidden slide 2 for directions

The new protocol creators
Engineers and entrepreneurs, many without formal training in computer science or math Solving problems by re-arranging a few basic and well established primitives Design on-the-fly

Aggressively ignore formalisms and research on past systems
Insert presenter logo here on slide master. See hidden slide 2 for directions

A thousand implementations bloom
For Kerberos, PKIX, and WS-Security,
Subscribe
x