Implementation of Client Authentication System on Transparency Cache


The KIPS Transactions:PartC, Vol. 9, No. 2, pp. 181-188, Apr. 2002
10.3745/KIPSTC.2002.9.2.181,   PDF Download:

Abstract

There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply related to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. R. Kim and Y. W. Koo, "Implementation of Client Authentication System on Transparency Cache," The KIPS Transactions:PartC, vol. 9, no. 2, pp. 181-188, 2002. DOI: 10.3745/KIPSTC.2002.9.2.181.

[ACM Style]
Seong Rak Kim and Young Wan Koo. 2002. Implementation of Client Authentication System on Transparency Cache. The KIPS Transactions:PartC, 9, 2, (2002), 181-188. DOI: 10.3745/KIPSTC.2002.9.2.181.