1999
DOI: 10.1109/4236.807015
|View full text |Cite
|
Sign up to set email alerts
|

AAA protocols: authentication, authorization, and accounting for the Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
2

Year Published

2001
2001
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(30 citation statements)
references
References 2 publications
0
28
0
2
Order By: Relevance
“…Although our ID/locator separation architecture has resolved the mobility problem, the following thing is how to guarantee the identity authenticity of the mobile terminals in the handoff process. In today's Internet, some protocol standards have been developed to protect the mobile terminals and access networks, such as AAA protocol [12] and 802.1X [13], but they increase the handoff delay and can not do well in our ID/locator separation architecture. For the above reasons, this paper proposes the authentication mechanism AuMID which can make the terminals achieve the secure handoff authentication by the use of Identity Tag.…”
Section: Introductionmentioning
confidence: 99%
“…Although our ID/locator separation architecture has resolved the mobility problem, the following thing is how to guarantee the identity authenticity of the mobile terminals in the handoff process. In today's Internet, some protocol standards have been developed to protect the mobile terminals and access networks, such as AAA protocol [12] and 802.1X [13], but they increase the handoff delay and can not do well in our ID/locator separation architecture. For the above reasons, this paper proposes the authentication mechanism AuMID which can make the terminals achieve the secure handoff authentication by the use of Identity Tag.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication, Authorization, Accounting (AAA) services are the commonly used mechanisms to protect the security of networks in distributed computing environments [32][33][34]. The authentication service is the first inspection mechanism that prevents and traces network crime.…”
Section: Preventing and Tracing Network Crimementioning
confidence: 99%
“…Because of this, the AAA WG soon discussed whether or not it could adopt an existing protocol [9]. In fact there were several possible candidates to choose from, including Simple Network Management Protocol (SNMP), COPS, RADIUS/RADIUS++, TACACS/TACACS+, and Diameter.…”
Section: Accounting Protocolsmentioning
confidence: 99%