Authentication Architectures
Why Authentication?
A Long Time Ago...
Approach 1: Passwords
Approach 2: Smart Cards
Approach 3: Hand-held Tokens
Approach 4: Proxy Logins
Approach 5
Lessons Learned
From the Baltimore Sun,13 June 1989
Fast Forward: Security for the NNS
Web Browsers and OSSes
Browsers Versus Tokens
How Should BrowsersDo Authentication?
Authentication Cookies
Certificates
The Myth of the PKI
“I Left my Token Home”
Upcoming Issues
Single Sign-on
Role-Based Authentication
Cross-Certification
Trustworthy Platforms
The Role of Architecture
No Panaceas
Email: smb@research.att.com
Home Page: http://www.research.att.com/~smb
Download presentation source