CryptoNET: Security Management Protocols

Size: px
Start display at page:

Download "CryptoNET: Security Management Protocols"

Transcription

1 CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE , Kista, SWEDEN {aghafoor, Abstract: - In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on wellestablished security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects. These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol. Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (PIV) smart cards. It also manages protocols attributes using security applets stored in PIV smart card. Key-Words: - FIPS-201 (PIV) smart cards, mutual strong authentication, generic security objects,, secure session, key management, authorization policies. 1 Introduction Protocols are an important component of distributed applications. They define set of rules needed to establish connections, exchange administrative messages, and transfer data between applications components. Distributed applications are essential for enterprises, financial, educational, and other institutions to manage their activities and operations [1]. Most of them have serious concerns about security of their resources and operations. In response to market demands, various existing standalone and distributed applications were either extended with security futures or designed new security protocols and methods for adding security functions and features in those applications (see section 2). However, in most of these applications, security functions and features are applied only to specific resources of individual application. Most of them are using proprietary security techniques and protocols, which are very complicated to extend them with new security features. Our analysis showed that most of them use conventional security protocols and techniques like username passwordbased authentication, they store security credentials in files, they use software-based cryptographic functions, etc. Therefore, weak security protocols and security credentials are the main target of attackers trying to reveal secret keys, security attributes, to launch replay attacks [19], and hijack sessions for unauthorized access to information [2]. To combat against most of identification and authentication attacks and cyber crimes, in 1978 smart card technology was introduced [3]. Smart cards are convenient, easy to use, and provide multifactor authentication as compared to conventional username password-based authentication. They combine physical identity with logical identity to provide better identification and authentication services. In early days, most of smart cards were used only for identity verification and authentication purposes due to limited storage capacity and processing capabilities, but recent advancements and standardization in this field increased the usage of smart cards in standard security mechanisms and protocols [4]. We analyzed some of smart card-based security protocols and applications in section 2 and found that most of them support only security functions for individual application. Some of products support only specific smart cards and require special administrative rights to write application-specific security credentials in them. Furthermore, these protocols are not mutually integrated, so each protocol maintains its own security attributes using proprietary techniques, not accessible to other protocols. Most of existing products are using proprietary solutions so they are very complicated to extend with new security protocols and features. In this paper we describe smart card-based security management protocols which are based on wellestablish security standards and technologies. These ISSN: ISBN:

2 protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol [15], and secure sessions protocol. The design of protocols is based on the concept of generic security objects, so each protocol provides complete and the same set of functions and features in order to extend any application with security. Furthermore, they are mutually integrated, so that resources and actions of one protocol are used by another protocol, when needed. They are activated and executed automatically without any user intervention, because each protocol transparently handles security credentials, smart cards, and attributes. The security management protocols are generic and based on modular approach. Therefore, it is easy to add new protocols or replace the logic of the existing ones, if needed, without modifying applications. The following are the main features of our security protocols: They are all based on generic security objects and modular, so the same protocols provide the same set of security services to all components of the CryptoNET System; They are all fully compliant to wellestablished security standards, like FIPS 201 [5], FIPS 196, SAML, etc.; They use the same Security Provider in order to provide the same set of cryptographic services; and Security protocols are easy to understand, so developers can easily integrate them with their applications. 2 Existing Smart Card-based Applications and Security Protocols Smart card are the most expanding technology used in a wide range of applications, from digital access to physical access, online payments to paying on Point-of-Sale (PoS), mobile phones to personal gadgets, and even to the development of next generation secure applications and services. The key features of smart-cards are: (1) they tightly couple physical identity with logical identity, (2) they protect security credentials, and (3) they provide encryption and decryption services without extracting security credentials from smart cards. Due to these features, smart cards got acceptance by businesses, enterprises, and service providers. Users are looking for new and innovative smart cardsbased secure applications and security protocols [7] for protection of their resources. In 2006 NIST published specification FIPS 201, which addressed security requirements and implementation details of the Personal Identity Verification system for government employees. Based on the FIPS-201 standard, Gemplus introduced SafesITe PIV Client to provide highest level of security to government networks [8]. SafesITe is also compliant with MS-CAPI (Microsoft- Crypto Application Programming Interface) and PKCS-11 (Public Key Cryptography Standards) standards. Based on this library, in 2006 Gemplus launched an identity management system to achieve portability and high level of security for government networks [9]. This system is also compliant with Homeland Security Presidential Directive-12 (HSPD-12) [10]. SafesITe PIV client module installed on user machine securely performs strong authentication, encryption, decryption, and generates smart card-based digital signature for application data. Gemalto in collaboration with IBM, also developed solution for Web-based single sign-on protocol based on smart cards for physical and logical access control. This product supports public key cryptography and is fully compliant with FIPS-201 and European Identification Authentication Signature standards. Another product which is used for smart card-based strong authentication is Gemalto s Strong Authentication and Customer Care Portal [11]. In this solution, Gemalto designed a smart card-based Strong Authentication protocol to perform end-user validation with Gemalto Strong Authentication, while Customer Care Portal performs administrative tasks, like managing Gemalto smart cards devices, authentication policies, roles, user, key and functions. Furthermore, this portal enables end-users to register and manage their passwords and account information. Smart Card Alliance [12] is an organization which provides recommendations to different member s organizations for smart card manufacturing, middleware development, and smart card-based applications. The core objective of Smart Card Alliance is to promote smart card technologies for identification, payment and other user applications to ensure user privacy, data security, and integrity. Another interesting protocol is Protocol for Lightweight Authentication of Identity (PLAID) [13], based on symmetric and asymmetric cryptography in order to protect communication between smart card and terminals. This protocol provides mutual strong authentication protocol and protection of data packets between contact less smart cards and smart card readers, which is a terminal device. Motivated by the current smart card standardization initiatives, development of smart card technologies, ISSN: ISBN:

3 and possibilities for their integration with applications, we designed smart card-based security management protocols for CryptoNET [14] architecture. These protocols are based on wellestablished security standards and technologies. We used generic security objects, modular and generalized approach for designing the generic security protocols, which provide the same set of security services to secure applications. They are easy to integrate with applications. Furthermore, they are mutually integrated, so that resources and actions of one protocol are used by another, when needed. In addition, all these protocols use the same smart card. The protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol. 3 Overview of The CryptoNET System CryptoNET is an integrated framework, as shown in Fig. 1, which strongly protects IT resources, operations and messages in transit. CryptoNET comprises: Secure Station Manager (equivalent to Windows Explorer), Secure Client, Secure Documents System, Secure Browser, Several Application s and global security infrastructure servers. In order to provide extended security services, it uses security protocols for Inf. Security Administrator Client Mail Client Issuing PKI Secure Application Secure Message Policy PKI Secure Station Manager XACML Policy PEP Web Browser Mutual Strong Authentication Top PKI Single Sign on Doc Manager IDMS SA SAML Ticket Security Administrator Fig. 1: Abstract Design of The CryptoNET System and Interaction between Components mutual remote authentication, secure communication, and enforcement of authorization polices. These protocols are described in section 4. Application specific functions of each component are not described in this paper since we considered only functions and features required by various security management protocols. The following are the servers of the CryptoNET system: - Local Certification Authority (LCA) : LCA issues and distributes X.509 certificates to all components. This server is also connected with the Top PKI and with the Policy PKI for trusted hierarchy; - IDentity Management System (IDMS) : It manages identities of different resources and clients, and application servers; - XACML Policy : It is also known as Policy Decision Point (PDP). XACML Policy is responsible for creation of SAML tickets, XACML authorization policies [6] and policy sets, and for making decisions based on the SAMLAuthorizationRequests; and - Strong Authentication : It performs strong authentication with clients and passes SAML tickets to clients, generated by the XACML Policy. - Policy Enforcement Point (PEP): PEP is a proxy component of each Application. It enforces authorization policies and consults with XACML Policy for validating SAML Tickets and evaluating XACML polices. - Secure Application s: These are customized application servers which provide application-specific services to various clients of the CryptoNET system. Examples are: Secure , Secure Library etc. Detailed functions and components of the CryptoNET are described in [4]. Design of the CryptoNET is based on modular approach and implemented in a form of plugins. Generic plugins provide features to reuse components with the same set of tested and verified security services by multiple applications. 4 Design and Operations of Security Management Protocols Security Administrator (SA) with administrator s rights registers users in the IDMS. The SA creates a complete profile of each user, which is used to form a Distinguished Name for certificates. SA loads card authentication credentials and security applet into user s FIPS-201 (PIV) smart cards. Security applet ISSN: ISBN:

4 is managing identity of the user, basic authentication credentials, like username and password, SAML ticket, symmetric key, secure session attributes, and application specific security credentials. After issuance of a smart card, the user logins into a workstation, using PIN and/or fingerprint. Upon successful login, the user generates RSA key pairs in a smart card in order to create four certificates. These are: PIV Authentication certificate, digital signature, key exchange, and digital signature+nonrepudiation certificates. After that, it generates certificate requests which are sent to the LCA. Upon reception of certificates, it stores them in the smart card. If LCA does not exist in a domain, then it generates three self-signed certificates. The purpose and usage of each certificate is explained in the coming sections. Design of security protocols is based on a modular approach and each module is implemented using the concept of generic security objects. Security protocols are: initial user authentication using FIPS 201 (PIV) smart cards, FIPS 196 based strong authentication protocol, single-sign-on protocol, secure session, and SAML authorization protocol. In our system we used security protocols to establish secure sessions and provide network security services to various components of the CryptoNET. 4.1 Remote User Authentication Protocol In our system remote user authentication is performed using mutual Strong Authentication protocol. It is an extension of the FIPS-196 strong authentication protocol. Its extended security functions are: verification of certificates by the LCA and verification of identities by the IDMS. As mentioned above, Security Protocols use Security Provider for software or smart card-based cryptographic functions. So our mutual Strong Authentication protocol also uses PIV credentials and smart card-based cryptographic functions. In our system, client initiates mutual strong authentication protocol with the SA and sends PIV authentication certificate to the SA instead of the Hello message, as specified in the FIPS 196 standard: Client SA : Cert PIV-a SA receives the certificate and verifies it by sending it to the LCA. In addition, it also verifies the distinguished name of the user using IDMS. Upon successful verification, SA generates random number R s and sends it to the client. Otherwise, if verification fails, it informs the client and stops conversation with the client. Client: R s Client receives R s and signs it using private key corresponding to the PIV authentication certificate. The following are cryptographic functions to generate signature of the R s. h = H (R s ) (5.1) S(R s ) = E (h, private key) (5.2) In these equations, H is a hash function and h is the output of the hash function. E is an encryption function which encrypts h using private key corresponding to the PIV authentication certificate. In the next step, client generates a random number R c and returns it with S(R s ) to the SA. Client : {S(R s ), R c } SA receives the message and verifies client s signature using the following cryptographic functions: h = H (R s ) h`= D (S(R s ), public key) (5.3) In equation (5.3), SA uses public key, extracted from the PIV authentication certificate of the client, for verification of the signed challenge (S(R s )). If h is equal to h`, SA returns digitally signed R c and its digital signature certificate to the client. Cryptographic functions are the same as explained in Equations (5.1) and (5.2). Client: {S(R c), Cert sa} Client receives signed random number and verifies its digital signature, using Equation (5.1) and Equation (5.3), but in this case it uses public key extracted from the digital signature certificate of the SA. In addition, it also verifies digital signature certificate from the LCA and the identity of the SA using IDMS. Client : S(R c), Cert sa Upon successful authentication, SA creates connection with the XACML Policy and sends the identity of the client (distinguished name) requesting SAML ticket. XACML Policy validates client s identity using IDMS and generates SAML ticket. SAML ticket contains ticket-id, identity of the client, timestamp, and IP address of the XACML Policy. XACML Policy also digitally signs SAML ticket (ST) using its own private key corresponding to its digital signature certificate. It sends signed ST to the SA which then sends it back to the client. Client receives ST and stores it in the security applet in a smart card. ISSN: ISBN:

5 4.2 Single-Sign-On Protocol When client establishes connection with some Secure Application, the initiates single-sign-on protocol. Upon receiving initiation, client fetches ST from a smart card and digitally signs it using private key corresponding to his/her digital signature certificate. It sends ST to the Policy Enforcement Point (proxy to the application server) along with digital signature certificate: Client PEP::Request(ST s,cert DSc) (5.4) The PEP component also signs ST and concatenates to it multi-party signature ST ss. The PEP component encapsulates ST ss in the SAMLAuthenticationRequest message and sends it to the XACML Policy for validation: PEP XACMLPolicy::SAMLAuthenticationRe questst,st ss,cert DSc) (5.5) XACML Policy verifies both signatures. Successful verification of signatures proves that SAML ticket, received from the PEP, was presented by the owner of the SAML ticket, which provides source authentication. After this, XACML Policy consults SAML-Tickets database, in order to validate ST. If it is OK, XACML Policy sends SAMLAuthenticationResponse message to the PEP component, as shown in (5.6), which contains authentication decision: XACMLPolicy PEP::SAMLAuthenticationRes ponse (Permit/Deny) (5.6) If the decision is Deny, PEP informs the client and terminates the connection without any further correspondence. If it is Permit, PEP component establishes secure session with the client. 4.3 Secure Sessions In our system secure session is established after a single-sign-on protocol is successfully completed. Secure Application requests KeyExchange certificate from a client. The purpose of the KeyExchange certificate is to securely exchange session-key and session-id between a client and Secure Application s. To manage secure sessions attributes at the server, PEP creates an active session object for the specific client in a session s container. Each object in the session container contains the identity of an authenticated client, session key, and session id. Upon reception of certificate request, the client fetches KeyExchange certificate from a smart card and sends it back to Secure Application. Since single-sign-on protocol is capable to authenticate clients in a distributed environment, there is still a possibility that the attacker may launch replay or impersonation attack by presenting valid SAML Ticket. To combat against such type of attacks, Secure Application receives KeyExchange certificate and compares its distinguished name with the identity stored in the session container. In addition, Secure Application also verifies the certificate chain. Upon successful verification, Secure Application generates a session-symmetric-key and session id, which are digitally signed by using private key corresponding to its own digital signature certificate and enveloped using public key corresponding to KeyExchange certificate of the client. It sends session key exchange message to the client, as shown in (5.7). SecureApplication Client::P(SK,SID), KeyExchangeCertas (5.7) Client receives the message and verifies the signature. Upon successful verification, it opens the envelope using private key corresponding to KeyExchange certificate in order to extract sessionsymmetric-key and session id. Client stores both session attributes in a smart card, if it is installed. Otherwise, it stores them in a key-file. Client uses session-symmetric-key and smart card based cryptographic functions to create secure messages in the standard format PKCS#7SignedAndEnvelopedData. The purpose of session-id is to enable the secure application client and secure application server to perform secure asynchronous communication. 4.4 Authorization Protocol Authorization policies in our security system are based on the XACML standard [101]. We adopted Role-Based Access Control model, so an authorized person (for example Security Administrator (SA)), creates a group and defines access level for each group member along with his/her role and permitted actions. SA generates a Policy Token (Policy Set) which includes Target object which is used to identify the role of each group member in a group. Target contains the name of a group member, the name of a resource, and actions permitted to be performed by a group member with the specified resource. In addition, SA can also specify Policy and Rules objects, if required. SA saves newly created policy in an XACML policy file. When an authorized group member requests an access to a specific resource, it fetches SAML ticket ISSN: ISBN:

6 from a smart card and sends it to the PEP server, along with the name of the requested resource. The PEP server creates SAMLAuthorizationRequest message and sends it to the XACML Policy. XACML Policy consults policy file and generates SAMLAuthorizationResponse message, which contains authorization decision. SAMLAuthorizationResponse is sent back to the PEP server in order to enforce authorization policy accordingly. 5 Conclusions Security protocols are designed based on generic security objects which provide the same set of security services to various applications. Together with modules of Security Provider, these protocols provide the complete set of security functions and features needed to extend any applications with security. Security protocols are mutually integrated, so that resources and actions of one protocol are used by another protocol, when needed. Security protocols handle security credentials and can be activated and executed automatically without user intervention. It is easy to add new protocols or replace the logic of the existing ones, if needed. References: [1] B. P. Kumar, J. Selvam, V. S. Meenakshi, K. Kanthi, A. L. Suseela, V. L. Kumar, Business decision making, management and information technology, publisher ACM New York, NY, USA. Volume 2007 [2] R. Lowe, Malicious Software Attacks targeting Home Users and Businesses, Australian Computer Emergency Response Team, 3 visited on December, [3] M.l Tunstall, Smart Card Security, publisher Springer US, pp December, 2007 [4] Microsoft Corporation, Identity and Access Optimization Strong Authentication using Smart Cards Smart Card Lifecycle Management, B/3FBC5A24-B96A-40B4-AC8F- 43A476E27766/Smart_Card_Lifecycle_Manag ement_datasheet.pdf, visited on January, 2010 [5] C. M. Gutierrez, W. A. Jeffrey, FIPS PUB 201-1: Personal Identity Verification (PIV) of Federal Employees and Contractors, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD , March [6] S. Godik, T. Moses, extensible 2 Access Control Markup Language (XACML), Version 1.0, OASIS Standard, February, [7] S. Srinivasan, Alan S. Secure and Practical Smart Card Applications, Information Systems Control Journal, Volume 5, 2003, [8] Gemplus North America, SafesITe Enterprise Smart. Simple. Secure, ad/safesite_ent_brochure.pdf, visited on December, 2009 [9] Gemplus Inc., Gemplus Launches Identity Management Solution Compliant with FIPS 201, 12,+FIPS+201,+and+TWIC+Announcements/ gemplus-launches-identity-managementsolution-compliant-with-fips-201 Updated on [10] Article, Policies for a Common Identification Standard for Federal Employees and Contractors, Homeland Security Presidential Directive-12 (HSPD 12), shtm, August 27, 2004 [11] Gemalto Inc., Protiva Enterprise Security Solutions for Tivoli Access Manager, Combined convenience of Enterprise and Web single sign-on with the security of smart card authentication, protiva_enterprise_tivoli.pdf [12] Smart Card Alliance, [13] CentreLink, Protocol for Lightweight Authentication of Identity (PLAID), Logical Smart Card Application Specification, Version 7.1, February, 2009 [14] G. Abbasi, S. Muftic, CryptoNET: Integrated Secure Workstation, published in International Journal of Advanced Science and Technology, pp. 1-10, Vol. 12, November, [15] OASIS, S. Cantor, J. Kemp, R. Philpott, E. Maler, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard, 15 March 2005, v2.0/ ISSN: ISBN:

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004

More information

Strong Authentication Protocol using PIV Card with Mobile Devices

Strong Authentication Protocol using PIV Card with Mobile Devices KTH Information and Communication Technology Strong Authentication Protocol using PIV Card with Mobile Devices Kunning Mao KTH Royal Institute of Technology School of Information and Communication Technology

More information

The Security Framework 4.1 Programming and Design

The Security Framework 4.1 Programming and Design Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: info@setecs.com Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO

More information

Using PIV Smart Cards on Linux for Authentication to Windows Active Directory

Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

Secure E-mail System for Cloud Portals

Secure E-mail System for Cloud Portals Secure E-mail System for Cloud Portals Master Thesis in Information and Communication Systems Security DANIEL GÓMEZ VILLANUEVA Master s Degree Project Stockholm, Sweden 2012 TRITA-ICT-EX-2012:210 Acknowledgements

More information

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Software and Cloud Security

Software and Cloud Security 1 Lecture 12: Software and Cloud Security 2 Lecture 12 : Software and Cloud Security Subjects / Topics : 1. Standard ISO/OSI security services 2. Special problems, specific for software components and

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Apache Milagro (incubating) An Introduction ApacheCon North America

Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro will establish a new independent security framework for the Internet A Distributed Cryptosystem Secure the Future of the

More information

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio Sazzad.Masud@gmail.com, Ram.Krishnan@utsa.edu Abstract Cloud

More information

Managed Portable Security Devices

Managed Portable Security Devices Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

Secure Identity in Cloud Computing

Secure Identity in Cloud Computing Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Cybersecurity and Secure Authentication with SAP Single Sign-On

Cybersecurity and Secure Authentication with SAP Single Sign-On Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

Architecture for Issuing DoD Mobile Derived Credentials. David A. Sowers. Master of Science In Computer Engineering

Architecture for Issuing DoD Mobile Derived Credentials. David A. Sowers. Master of Science In Computer Engineering Architecture for Issuing DoD Mobile Derived Credentials David A. Sowers Thesis submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website:

More information

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012 Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Implementing Identity Provider on Mobile Phone

Implementing Identity Provider on Mobile Phone Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,

More information

Architecture of Enterprise Applications III Single Sign-On

Architecture of Enterprise Applications III Single Sign-On Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: chen-hp@sjtu.edu.cn

More information

Identity Management for Interoperable Health Information Exchanges

Identity Management for Interoperable Health Information Exchanges Identity Management for Interoperable Health Information Exchanges Presented to the NASMD Medicaid Transformation Grants HIE Workgroup - March 26, 2008 Presented by: John (Mike) Davis, Department of Veterans

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth alangguth@novell.com September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008 Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT

More information

Chapter 15 User Authentication

Chapter 15 User Authentication Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech (woong07@seoultech.ac.kr) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014 Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent

More information

Public Key Applications & Usage A Brief Insight

Public Key Applications & Usage A Brief Insight Public Key Applications & Usage A Brief Insight Scenario :: Identification, Authentication & Non- Repudiation :: Confidentiality :: Authenticity, requirements and e-business Integrity for electronic transaction

More information

Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications

Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications Feng Zhang 1, Ioannis Kounelis 1,2, and Sead Muftic 1 1 Communication Systems School of Information

More information

Identity Security Using Authentication and Authorization in Cloud Computing

Identity Security Using Authentication and Authorization in Cloud Computing Identity Security Using Authentication and Authorization in Cloud Computing D.Ranjith #1, J.Srinivasan *2 # Department of Computer Science and Applications, Adhiparasakthi College of Arts and Science,Kalavai,Vellore-632506

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Best Practices for Privileged User PIV Authentication

Best Practices for Privileged User PIV Authentication NIST Cybersecurity White Paper csrc.nist.gov Best Practices for Privileged User PIV Authentication Computer Security Division Information Technology Laboratory Applied Cybersecurity Division Information

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

User Guide Remote PIV to VDI Using a PIV Card

User Guide Remote PIV to VDI Using a PIV Card User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Arcot Systems, Inc. Securing Digital Identities FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Today s Agenda Background Who is Arcot Systems? What is an ArcotID? Why use

More information

Applying Cryptography as a Service to Mobile Applications

Applying Cryptography as a Service to Mobile Applications Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Information Security

Information Security Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1 Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can

More information

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics B.Prasanalakshmi Assistant Professor Department of CSE Thirumalai Engineering College

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Strong Authentication for Future Web Applications

Strong Authentication for Future Web Applications Strong Authentication for Future Web Applications Chris Williams Leidos, Inc. July 18, 2014 For W3C Identity in the Browser Workshop Abstract Leidos (formerly SAIC), has been using strong authentication

More information

A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode

A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode Haojiang Gao 1 Beijing Northking Technology Co.,Ltd Zhongguancun Haidian Science Park Postdoctoral

More information

CS 4803 Computer and Network Security

CS 4803 Computer and Network Security Many-to-Many Authentication CS 4803 Computer and Network Security s? Servers Alexandra (Sasha) Boldyreva Kerberos How do users prove their identities when requesting services from machines on the network?

More information

How To Encrypt Data With Encryption

How To Encrypt Data With Encryption USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security

More information

Authentication Protocols Using Hoover-Kausik s Software Token *

Authentication Protocols Using Hoover-Kausik s Software Token * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 691-699 (2006) Short Paper Authentication Protocols Using Hoover-Kausik s Software Token * WEI-CHI KU AND HUI-LUNG LEE + Department of Computer Science

More information

HSPD-12 Homeland Security Presidential Directive #12 Overview

HSPD-12 Homeland Security Presidential Directive #12 Overview HSPD-12 Homeland Security Presidential Directive #12 Overview HSPD-12 Stands for Homeland Security Presidential Directive #12. HSPD-12 is the Policy for a Common Identification Standard for Federal Employees

More information

VMware Zimbra Security. Protecting Your VMware Zimbra Email and Collaboration Environment

VMware Zimbra Security. Protecting Your VMware Zimbra Email and Collaboration Environment Protecting Your VMware Zimbra Email and Collaboration Environment Technical WHITE PAPER Table of Contents VMware Zimbra Approach to Security... 3 Open-Source Commitment.... 3 Flexible, Object-Based Design....

More information

NIST Cybersecurity White Paper

NIST Cybersecurity White Paper The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication: Title: NIST Cybersecurity White Paper Best Practices for Privileged User

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication

Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication Office of Technology Strategies (TS) Architecture, Strategy, and Design (ASD) Office of Information and Technology

More information

A Method of Risk Assessment for Multi-Factor Authentication

A Method of Risk Assessment for Multi-Factor Authentication Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.187 A Method of Risk Assessment for Multi-Factor Authentication Jae-Jung Kim* and Seng-Phil Hong** Abstract

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

DoD CAC Middleware Requirements Release 4.0

DoD CAC Middleware Requirements Release 4.0 DoD CAC Middleware Requirements Release 4.0 Version 1.01 26 November 2012 Prepared by: DoD Identity Protection and Senior Coordinating Group s (IPMSCG) Test and Evaluation Work Group (TEWG) UNCLASSIFIED

More information

ARCHIVED PUBLICATION

ARCHIVED PUBLICATION ARCHIVED PUBLICATION The attached publication, NIST Special Publication 800-63 Version 1.0.2 (dated April 2006), has been superseded and is provided here only for historical purposes. For the most current

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Security Architecture for Cloud Computing Platform

Security Architecture for Cloud Computing Platform Security Architecture for Cloud Computing Platform SANJAYA DAHAL Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:291 Abstract Cloud computing is an innovation of existing technology

More information

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential

More information

Secure Enterprise Applications enabled by SETECS Security Infrastructure Products

Secure Enterprise Applications enabled by SETECS Security Infrastructure Products Secure Enterprise Applications enabled by Security Infrastructure 1. Secure E mail/secure Web (SSL) 2. Secure Web Services: Identity Management, Single Sign On, and Web Authorization 3. Public Key Infrastructure

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

Global Identity Management of Virtual Machines Based on Remote Secure Elements

Global Identity Management of Virtual Machines Based on Remote Secure Elements Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management

More information

PrivateServer HSM EKM Provider for Microsoft SQL Server

PrivateServer HSM EKM Provider for Microsoft SQL Server PrivateServer HSM EKM Provider for Microsoft SQL Server January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information