Authentication Architectures

2/12/99


Click here to start


Table of Contents

Authentication Architectures

Why Authentication?

A Long Time Ago...

Approach 1: Passwords

Approach 2: Smart Cards

Approach 3: Hand-held Tokens

Approach 4: Proxy Logins

Approach 5

Lessons Learned

From the Baltimore Sun,13 June 1989

Fast Forward: Security for the NNS

Web Browsers and OSSes

Browsers Versus Tokens

How Should Browsers Do Authentication?

Authentication Cookies

Certificates

The Myth of the PKI

“I Left my Token Home”

Upcoming Issues

Single Sign-on

Role-Based Authentication

Cross-Certification

Trustworthy Platforms

The Role of Architecture

No Panaceas

Author: Steven M. Bellovin

Email: smb@research.att.com

Home Page: http://www.research.att.com/~smb

Download presentation source