CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Kerberos based Framework for Electronic Tender Processing

Published on November 2012 by Rashi Kohli, Divya Sharma, Santar Pal Singh
Issues and Challenges in Networking, Intelligence and Computing Technologies
Foundation of Computer Science USA
ICNICT - Number 4
November 2012
Authors: Rashi Kohli, Divya Sharma, Santar Pal Singh
c446c406-d638-4cce-aae1-ea63f1c95caa

Rashi Kohli, Divya Sharma, Santar Pal Singh . A Kerberos based Framework for Electronic Tender Processing. Issues and Challenges in Networking, Intelligence and Computing Technologies. ICNICT, 4 (November 2012), 20-23.

@article{
author = { Rashi Kohli, Divya Sharma, Santar Pal Singh },
title = { A Kerberos based Framework for Electronic Tender Processing },
journal = { Issues and Challenges in Networking, Intelligence and Computing Technologies },
issue_date = { November 2012 },
volume = { ICNICT },
number = { 4 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 20-23 },
numpages = 4,
url = { /specialissues/icnict/number4/9039-1060/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Issues and Challenges in Networking, Intelligence and Computing Technologies
%A Rashi Kohli
%A Divya Sharma
%A Santar Pal Singh
%T A Kerberos based Framework for Electronic Tender Processing
%J Issues and Challenges in Networking, Intelligence and Computing Technologies
%@ 0975-8887
%V ICNICT
%N 4
%P 20-23
%D 2012
%I International Journal of Computer Applications
Abstract

Proposed system structure can be used in any World-Wide Web technology to make possible implementation of a secure electronic tender processing system. This System offers possibilities considering both cost-effectiveness and security. Providing mutual authentication [11,12] is the correct way to make possible secure communication and transmission of data among parties with reliability, confidentiality & security in WAN, MAN, LAN etc technologies used in Electronic Tender Processing & this can be achieved by using Kerberos as an Authentication services. In this paper the system structure and communication protocol of a system utilizing these possibilities are proposed, that should be profitable when designing a final implementation.

References
  1. Heimdal and Windows 2000 Kerberos-how to get them to-Westerlund,Danielsson (2001)
  2. Asad Amir Prizada and Chris McDonald, "Kerberos Assist Authentication in Mobile Ad-hoc Networks",School of Computer Science & Software Engineering,The Univercity of Western Australia,Sep 2004
  3. Applied Security Technologies, Smart Card Lifecycle Security Guidelines, Issue 1. 0, dated 19 May 2003.
  4. OpenSSL. http://www. openssl. org/.
  5. Schapper, P. R. "Authentication: The Art of Discovering Whether Appearances are True or False" Proceedings of the Electronic Government Procurement Conference, Manila, Asian Development Bank, Inter- American Development Bank, World Bank. , Oct 2004
  6. Netscape, Signing Text from JavaScript, 2004. http://developer. netscape. com/docs/manuals/security/sgnt xt/index. htm
  7. Douglas E. Engert, "Self Imposed Limitations of Kerberos",Argonne National Laboratory,April 2004.
  8. (8) Joan Daemen and Vincent Rijmen. Rijndael, the Advanced Encryption Standard. Dr. Dobb's Journal, 26(3):137{139, March 2001
  9. Information Security Committee Electronic Commerce Division, Section of Science & Technology Law, American Bar Association, "PKI Assessment Guidelines", Guidelines to help assess and facilitate interoperable trustworthy public key infrastructures, PAG v0. 30 Public Draft for Comment, June 2001.
  10. MasterCard. Secure Payment Application (SPA). http://www. mastercardintl. com/.
  11. Burr-Donna, W. E. , Dodson, E. , Polk, W. T. "Electronic Authentication Guideline" . Recommendations of the National Institute of Standards and Technology. September 2004.
  12. Clarke, R. Authentication: A Sufficiently Rich Model to Enable E-Business.
  13. http://www. anu. edu. au/people/Roger. Clarke/EC/AuthMo del. html
  14. Clarke, R. The Reinvention of Public Key Infrastructurehttp://www. anu. edu. au/people/Roger. Clarke /EC/PKIReinv. html Committee on Government Reform, House of Representatives. "Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology", Report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, February 2001.
  15. Directorate for Science, Technology and Industry Committee for Information, Computer and Communications Policy, "Summary of responses to the survey of legal and policy frameworks for electronic authentication services and e-signatures in OECD member countries", July 2004.
  16. www. oecd. org/sti/security-privacy
  17. e-Government Interoperability Framework,Part2, Version 5. 1, October 2003
Index Terms

Computer Science
Information Sciences

Keywords

Confidentiality integrity Non-repudiation security cryptography Authentication Hypertext Transfer Protocol(http) Secure Socket Layer(ssl) Wan Man Lan World-wide-web(www)