Proceedings of the 2007 ACM Workshop on Computer Security Architecture 2007
DOI: 10.1145/1314466.1314475
|View full text |Cite
|
Sign up to set email alerts
|

Improving multi-tier security using redundant authentication

Abstract: Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make lower tiers more secure in the presence of compromised higher tiers. In this paper, we investigate an extension of this technique in which higher tiers are required to provide evidence of the authentication of principals when they make requests of lower tiers. This concept, which we call redundant authentication, enables lower tiers t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Finally, some other works proposed different types of gateways for SB. In [69], a gateway relying mainly on XML exchanges over HTTPS is proposed to improve authentication. In this project a set of redundant authentication gateways are developed that manage the access of users to end points, which can be used to enforce a security policy.…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%
“…Finally, some other works proposed different types of gateways for SB. In [69], a gateway relying mainly on XML exchanges over HTTPS is proposed to improve authentication. In this project a set of redundant authentication gateways are developed that manage the access of users to end points, which can be used to enforce a security policy.…”
Section: Intrusion Detection and Preventionmentioning
confidence: 99%
“…In the context of multi-tier systems, self-protection was addressed in [11]. The author investigate an extension of the least privilege strategy technique, in which higher tiers are required to provide authentication when requests of lower tiers are made.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of multi-tier systems, self-protection was addressed in [15]. The authors investigate an extension of the least privilege strategy technique, in which higher tiers are required to provide authentication when requests to lower tiers are made.…”
Section: Related Workmentioning
confidence: 99%