A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr*
|
|
|
- Sharon Bishop
- 10 years ago
- Views:
Transcription
1 A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL Rainer Steffen, Rudi Knorr* Abstract Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios. We introduce a novel delegation system that describes digital trust between users by means of cryptographically secured tokens. The delegation system is organized by the users themselves in a fully distributed manner. A central instance like a lic key infrastructure is not required. The system supports anonymity, provides a high usability and is suitable for use within pervasive computing scenarios. 1. Introduction Security management in pervasive computing scenarios is a challenging task. We have to cope with dynamic and heterogeneous networks, a large number of different devices, users and services. To enable a secure collaboration between all the actors, an efficient access control is essential. In traditional computer and communication networks, access control is mostly managed by static access control lists (ACLs). These ACLs contain information about the objects that have to be protected (e.g. data files or services) and the subjects (e.g. users) which have the right to access these objects. Management of access control by ACLs presumes that the objects have knowledge about all the potential subjects, which might access the object. In future pervasive scenarios, this kind of access control mechanism is unsuitable. Firstly the administrative overhead for managing the ACLs in a dynamic scenario with a multitude of devices, users and services is increasing tremendously. Secondly there is no support of unknown devices and users as they can appear in pervasive and ad-hoc networks. A powerful approach to overcome these problems is delivered by the trust-paradigm. Instead of or in addition to an inflexible ACL configuration, trust relationships between the users are utilized to gain access to the objects. The goal is to map the natural trust between humans to the digital world. One of the trust approaches is the so-called delegation system which enables users to express and enforce the trust they have in others by means of digital trust tokens. In the following we elaborate a novel and user-friendly trust based delegation system that is suitable for the use within pervasive computing scenarios. This paper is organized as follows: section 2 gives a brief overview of related work, section 3 presents the novel architecture and some implementation aspects and chapter 4 provides the final conclusion and outlook. * Fraunhofer Institute for Communication Systems, Hansastrasse 32, Munich, Germany {Rainer.Steffen, Rudi.Knorr}@esk.fraunhofer.de 1
2 2. Related Work Digital Trust has become a widely accepted research field in the last few years. The intended field of applications comprises trust in very different areas. Examples are managing access control by using trust, trust for collaboration in (virtual) organizations and communities, estimation of trustworthiness of information and users, trust for electronic commerce and others. General overviews and surveys about trust in digital networks can be found in [2], [5] and [7]. When we consider trust as a mechanism for managing access control, the concept of trust based delegation systems is one approach. The basic idea behind delegation systems is that some active entity in a system delegates authority to another active entity in order to carry out some functions [1]. Depending on the design, delegation can be performed at a central instance (e.g. server) or in a decentralized manner using tokens or tickets to describe the delegation process. Usually tickets describe an operation that can be carried out by owning or delivering the ticket (e.g. access to an event or paying an amount of money). A ticket is issued exclusively; it can be passed on to someone else but can not be duplicated. Exemplary ticketing systems are described in [3] and [4]. s resemble tickets, with the difference that tokens can be duplicated and the effect of tokens can be restricted. The delegation of access rights with tokens can be based on trust relationships between users. Such a trust based delegation system is introduced in [6], at which the propagation of tokens and thus the access rights depend on the trust the users have into each other. Using trust based delegation systems for managing access control in pervasive environments is an attractive and feasible method. The main problem of the known trust based delegation systems is that they depend on a lic key infrastructure (PKI). A central PKI is in conflict with the mainly decentralized character of pervasive and ubiquitous systems. A PKI always requires authentication, thus all the potential users of the system must be known by the PKI; ad-hoc connections with unknown users and devices are not supported. The need of a PKI also implies that an offlinedelegation outside the system is not possible. In the following, we present a new and feasible trust based delegation system that overcomes the described problems. 3. Architecture of the Trust Based Delegation System The purpose of the described trust based delegation system is to use natural trust relationships to gain access to digital services. We assume that every digital resource or object can be modeled as a service with an access control entity and a service invocation method. Fig. 1 shows the basic principle of that concept. A trust source generates a token with explicit information about the access rights to a specific service or a trust value that describes the trust relationship between the trust source and user A. A trust value is described by a defined metric and can be seen as a kind of reference or attestation. User A can pass a copy of the token on to user B with the option to modify the access rights or the trust value in dependence on the trust user A has in user B. User B can act in the same way and distribute the token to another user he trusts. The token propagation, the permissions and trust values map the natural trust between the users into the digital world. 2
3 Trust Source Trust Trust Trust Service User A User B Figure 1: Trust chain During the service invocation user B delivers the token to the service. Through the content of the token, the service decides autonomously if the access will be granted or not. To some extent this approach is similar to a ticketing system, with the difference that we can copy and restrict our tokens. Our architecture allows an anonymous propagation of tokens without the need of a PKI, which is a novelty. Trust always implies uncertainty, thus risk has to be taken to a certain extent that a user acts different from what we would expect. In contrast to conventional access control systems like ACL, trust can only provide soft-security. Such a trust based access control system is appropriate to secure objects that have a small value and the demand for an easy to use access control. 3.1 Securing the s A token is an electronic information that comprises access permissions and trust values (in the following referred to as permissions). The permissions can be coupled to constraints like location, time, or in general, context. For example, a token can have a valid permission for a specific time of day or while the token holder acts in a specific surrounding. The tokens are described using the extensible markup language (XML) and can be transferred over arbitrary networks. The trust source is responsible to create an initial token that comprises a digital secret. This secret is only known to the trust source and the service the token is appointed to. The trust source and the service can be the same physical device. In a ubiquitous office scenario, for example, the trust source could be the administrative department or a system administrator. Every time a new token is generated by the trust source, it creates a new digital secret. In addition to the secret the token contains a lic key () for asymmetric encryption. The associated private key is only known by the service. The secret as well as the current permissions and constraints are stored inside the token as encrypted values; plaintext information about the current permissions is also enclosed so that the user can examine it. Fig. 2 a) shows an exemplary token for a first user (user A). User A can decrease the permissions and modify the coupled constraints before he gives an instance of the token to the next user (user B). User A encrypts the new permissions, along with the already encrypted part of the token, using the lic key (Fig. 2 b). Again the current permissions are stored in plaintext inside the token. User B and the following users can act in the same way. 3
4 a) b) c) perm = 3 plaintext encrypted perm = permissions = lic key Trust Source User A perm = 3 User B Trust Source User A User A User B User B User x Figure 2: Multiple encrypted token When a user wants to invoke a service, he delivers the token to the service that has to decipher the encrypted part of the token recursively with the private key until the primary secret is visible in plaintext. While deciphering, the integrity of the token is checked; illegal changes can easily be identified and if needed, the token can be blocked. On the basis of the last permissions, the service can decide itself whether to grant access or not. Since the integrity of the complete trust chain - from the trust source to the service - is secured by cryptographic measures, there is no need for a PKI and user authentication. Thus, also unknown users and devices can be supported. If a token is copied illegally (e.g. stolen from a user) or the trust between two users is broken, a revocation token can be used to annul or limit the permissions. For this reason an optional permission update list can be established inside the service. Every time the service decrypts an instance of the token, it checks the permission update list for current changes and uses the potential revocation token accordingly. 3.2 Implementation The described trust based delegation system was realized as a demonstrator. The software to manage the tokens (receive, relay and restrict) was implemented in Java on Windows Pocket PC handhelds. An exemplary service (light control) and the token based access control mechanism were implemented on a standard PC. The demonstrator offers a graphical user interface to easily exchange tokens between the handhelds by using wireless LAN. Owners of valid tokens are able to invoke the exemplary service and control the lighting according to the received permissions. Preliminary tests show that the system provides a high usability and user convenience. The effort to encrypt the tokens inside the handhelds and to multiply decrypt the tokens inside the access control entity of the service is quite low, so that no noticeable delays can be experienced. In the future, this demonstrator will be extended to support additional services provided by a service management middleware. Planned services are amongst others a trust based web site access, the support of electronic lock systems and the control of wireless LAN internet access for visitors. As the client software is written in Java it can quickly be ported to other platforms (e.g. PCs or mobile phones) and can easily be installed on different devices. 4
5 4. Conclusion and Outlook In some scenarios ease of use is valued more than the value of the objects that have to be protected. This occurs especially in pervasive scenarios, where usability is the key factor to user acceptance and often the objects to be secured are of small value. The presented delegation system allows a secure and easy to use trust based access control mechanism for pervasive scenarios. The described architecture allows an anonymous propagation of tokens without the need of a lic key infrastructure, which is a novelty. The user is not confronted with authentication, tokens can be passed on even if communication with the system itself is not possible (offline delegation) and unknown users and devices are supported. Permissions of a token can be restricted and the integrity of the trust chain can be checked by cryptographic measures. To increase the controllability of the system and to motivate users not to abuse the trust someone gave them, an optional permission update list can be established. Trust is always associated with risk. Therefore trust based systems just offer soft-security mechanisms and are appropriate to secure objects that have a small value. The delegation system is not designed to substitute but to complement traditional access control mechanisms. Future work will focus on introducing more permission constraints like a stronger context awareness or situation specific permissions. The implementation will be extended to support more services and platforms and will be integrated in our smart office environment using a service management middleware. 5. References [1] E. Barka, R. Sandhu, "Role-Based Delegation Model/ Hierarchical Roles (RBDM1)", in Proceedings of 20th Annual Computer Security Applications Conference, Tucson, AZ, USA, [2] M. Blaze, J. Feigenbaum, J. Ioannidis, A. D. Keromytis, "The Role of Trust Management in Distributed Systems Security", Secure Internet Programming, [3] D. Chaum, Security Without Identification: Transaction Systems to Make Big Brother Obsolete, Communications of the ACM, vol. 28 no. 10, [4] K. Fujimura, H. Kuno, M. Terada, K. Matsuyama, Y. Mizuno, J. Sekine, "Digital-Ticket-Controlled Digital Ticket Circulation", in Proceedings of 8th USENIX Security Symposium, Washington D.C., [5] A. Jøsang, R. Ismail, C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision, to appear in Decision Support Systems, [6] L. Kagal, S. Cost, T. Finin, Y. Peng, "A Framework for Distributed Trust Management", in Proceedings of IJCAI-01, Workshop on Autonomy, Delegation and Control, Montreal, Canada, [7] S. Lo Presti, M. Cusack, C. Booth, "Trust Issues in Pervasive Environments", Deliverable WP02-01, Trusted Software Agents and Services for Pervasive Information Environments Project, University of Southampton,
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
HOBCOM and HOBLink J-Term
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Secure Document Circulation Using Web Services Technologies
Secure Document Circulation Using Web Services Technologies Shane Bracher Bond University, Gold Coast QLD 4229, Australia Siemens AG (Corporate Technology), Otto-Hahn-Ring 6, 81739 Munich, Germany [email protected]
How To Use Pki On A Pc (For A Non-Profit)
Using PKI for PC Security Public Key Infrastructure (PKI) is an important foundation for network and information security. In essence, PKI provides an enterprise infrastructure for managing the keys necessary
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
A Simulation Game for Teaching Secure Data Communications Protocols
A Simulation Game for Teaching Secure Data Communications Protocols Leonard G. C. Hamey Department of Computing, Macquarie University, Sydney, Australia ABSTRACT With the widespread commercial use of the
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems Ginés Dólera Tormo Security Group NEC Laboratories Europe Email: [email protected]
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
The Disadvantages of Free MIX Routes and How to Overcome Them
The Disadvantages of Free MIX Routes and How to Overcome Them Oliver Berthold 1, Andreas Pfitzmann 1, and Ronny Standtke 2 1 Dresden University of Technology, Germany {ob2,pfitza}@inf.tu-dresden.de 2 Secunet,
Application of Tracking Technology to Access-control System
Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and
FIDO Trust Requirements
FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Why Password- Enabled PKI
Password Enabled Public-Key Infrastructure (PKI): Virtual Smartcards vs. Virtual Soft Tokens Ravi Sandhu Chief Scientist SingleSignOn.Net & Professor, George Mason University Mihir Bellare Chief Cryptographer
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
Authentication Methods for USIM-based Mobile Banking Service
Authentication Methods for USIM-based Mobile Banking Service Jonghyun Baek 1, Young-Jun Kim 1, Yoojae Won 1, HeungYoul Youm 2 Korea Information Security Agency, Seoul, Korea 1 Soon Chun Hyang University,
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider Golnaz Elahi Department of Computer Science University of Toronto Canada, M5S 1A4 Email: [email protected] Zeev
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
OpenID and identity management in consumer services on the Internet
OpenID and identity management in consumer services on the Internet Kari Helenius Helsinki University of Technology [email protected] Abstract With new services emerging on the Internet daily, users need
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)
Computer Science CSC/ECE 574 Computer and Network Security Topic 7.2 Public Key Infrastructure (PKI) CSC/ECE 574 Dr. Peng Ning 1 What Is PKI Informally, the infrastructure supporting the use of public
Practical Mobile Digital Signatures
Practical Mobile Digital Signatures Antonio Maña and Sonia Matamoros Computer Science Department University of Málaga. Spain. {amg, sonia}@lcc.uma.es Abstract. There are important details that give legal
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER
A SOA visualisation for the Business
J.M. de Baat 09-10-2008 Table of contents 1 Introduction...3 1.1 Abbreviations...3 2 Some background information... 3 2.1 The organisation and ICT infrastructure... 3 2.2 Five layer SOA architecture...
Distributed Identity Management Model for Digital Ecosystems
International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION
ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Network Security: Public Key Infrastructure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] CSG254: Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Full-scale Online Event Ticketing System The Design and Implementation
ABSTRACT Full-scale Online Event Ticketing System The Design and Implementation The paper analyzed the system requirements for online shopping in general and specific requirements for event ticket online
Insight Guide. Encryption: A Guide
Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Sentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
