Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Kerberos based Framework for Electronic Tender Processing

Print
PDF
IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies
© 2012 by IJCA Journal
ICNICT - Number 4
Year of Publication: 2012
Authors:
Rashi Kohli
Divya Sharma
Santar Pal Singh

Rashi Kohli, Divya Sharma and Santar Pal Singh. Article: A Kerberos based Framework for Electronic Tender Processing. IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT(4):20-23, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Rashi Kohli and Divya Sharma and Santar Pal Singh},
	title = {Article: A Kerberos based Framework for Electronic Tender Processing},
	journal = {IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies},
	year = {2012},
	volume = {ICNICT},
	number = {4},
	pages = {20-23},
	month = {November},
	note = {Full text available}
}

Abstract

Proposed system structure can be used in any World-Wide Web technology to make possible implementation of a secure electronic tender processing system. This System offers possibilities considering both cost-effectiveness and security. Providing mutual authentication [11,12] is the correct way to make possible secure communication and transmission of data among parties with reliability, confidentiality & security in WAN, MAN, LAN etc technologies used in Electronic Tender Processing & this can be achieved by using Kerberos as an Authentication services. In this paper the system structure and communication protocol of a system utilizing these possibilities are proposed, that should be profitable when designing a final implementation.

References

  • Heimdal and Windows 2000 Kerberos-how to get them to-Westerlund,Danielsson (2001)
  • Asad Amir Prizada and Chris McDonald, "Kerberos Assist Authentication in Mobile Ad-hoc Networks",School of Computer Science & Software Engineering,The Univercity of Western Australia,Sep 2004
  • Applied Security Technologies, Smart Card Lifecycle Security Guidelines, Issue 1. 0, dated 19 May 2003.
  • OpenSSL. http://www. openssl. org/.
  • Schapper, P. R. "Authentication: The Art of Discovering Whether Appearances are True or False" Proceedings of the Electronic Government Procurement Conference, Manila, Asian Development Bank, Inter- American Development Bank, World Bank. , Oct 2004
  • Netscape, Signing Text from JavaScript, 2004. http://developer. netscape. com/docs/manuals/security/sgnt xt/index. htm
  • Douglas E. Engert, "Self Imposed Limitations of Kerberos",Argonne National Laboratory,April 2004.
  • (8) Joan Daemen and Vincent Rijmen. Rijndael, the Advanced Encryption Standard. Dr. Dobb's Journal, 26(3):137{139, March 2001
  • Information Security Committee Electronic Commerce Division, Section of Science & Technology Law, American Bar Association, "PKI Assessment Guidelines", Guidelines to help assess and facilitate interoperable trustworthy public key infrastructures, PAG v0. 30 Public Draft for Comment, June 2001.
  • MasterCard. Secure Payment Application (SPA). http://www. mastercardintl. com/.
  • Burr-Donna, W. E. , Dodson, E. , Polk, W. T. "Electronic Authentication Guideline" . Recommendations of the National Institute of Standards and Technology. September 2004.
  • Clarke, R. Authentication: A Sufficiently Rich Model to Enable E-Business.
  • http://www. anu. edu. au/people/Roger. Clarke/EC/AuthMo del. html
  • Clarke, R. The Reinvention of Public Key Infrastructurehttp://www. anu. edu. au/people/Roger. Clarke /EC/PKIReinv. html Committee on Government Reform, House of Representatives. "Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology", Report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, February 2001.
  • Directorate for Science, Technology and Industry Committee for Information, Computer and Communications Policy, "Summary of responses to the survey of legal and policy frameworks for electronic authentication services and e-signatures in OECD member countries", July 2004.
  • www. oecd. org/sti/security-privacy
  • e-Government Interoperability Framework,Part2, Version 5. 1, October 2003