Blundo et al., 2005 - Google Patents
A lightweight approach to authenticated web cachingBlundo et al., 2005
View PDF- Document ID
- 1275987794739927697
- Author
- Blundo C
- Cimato S
- De Prisco R
- Publication year
- Publication venue
- The 2005 Symposium on Applications and the Internet
External Links
Snippet
Distributed caching is increasingly used to shorten the response time of Web servers and balance the load on the network by avoiding repeated transmission of the same content. An important research issue is the provision of access control mechanisms in the cache servers …
- 235000014510 cooky 0 abstract description 77
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/1002—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers, e.g. load balancing
- H04L67/1004—Server selection in load balancing
- H04L67/1014—Server selection in load balancing based on the content of a request
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gutzmann | Access control and session management in the HTTP environment | |
US6128738A (en) | Certificate based security in SNA data flows | |
EP2020797B1 (en) | Client-server Opaque token passing apparatus and method | |
CN103944900B (en) | It is a kind of that attack prevention method and its device are asked across station based on encryption | |
US7032110B1 (en) | PKI-based client/server authentication | |
KR101560440B1 (en) | Methods and apparatus for secure dynamic authority delegation | |
EP1368722B1 (en) | Method and system for web-based cross-domain single-sign-on authentication | |
EP1280317B1 (en) | Multi-domain authorisation and authentication | |
US8769266B2 (en) | Method for assembling authorization certificate chains | |
US20070271599A1 (en) | Systems and methods for state signing of internet resources | |
US20040003287A1 (en) | Method for authenticating kerberos users from common web browsers | |
US20030163691A1 (en) | System and method for authenticating sessions and other transactions | |
CA2379082A1 (en) | Secure cache of web session information using web browser cookies | |
Liu et al. | A secure cookie protocol | |
Sood et al. | Inverse Cookie-based Virtual Password Authentication Protocol. | |
Badra et al. | Phishing attacks and solutions | |
Simpson | Toward a zero trust metric | |
Blundo et al. | A lightweight approach to authenticated web caching | |
Zhao et al. | Design of single sign-on | |
Deeptha et al. | Extending OpenID connect towards mission critical applications | |
Uruena et al. | Analysis of a privacy vulnerability in the openid authentication protocol | |
Mittal et al. | Enabling trust in single sign-on using DNS based authentication of named entities | |
Jeannot | Kerberos V5 | |
Nobayashi et al. | Development of single sign-on system with hardware token and key management server | |
Alahmad et al. | Improved the authentication technology on Single Sign-On Protocol “OpenIDConnect” to avoid session hijacking attacks |