Authentication and Authorization Model for Safeguarding Mission Critical Applications in Pervasive Environment 2

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Pervasive Trust Paradigm for Authentication and Authorization

Trust plays a growing role in research on security in open computing systems, including Grid computing. We propose using trust for authorization in such systems. Traditionally, authentication and authorization in computer systems guard only user interfaces, thus providing only a perimeter defense against attacks. We search for an authentication and authorization approach that satisfies the requ...

متن کامل

Pervasive authentication and authorization infrastructures for mobile users

Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastr...

متن کامل

Authentication, Authorization, Admission, and Accounting for QoS Applications

The main objective of the IETF Differentiated Services (DiffServ) model is to allow the support on the Internet of different levels of service to different sessions and information flows, aggregated in a few number of traffic classes. This differentiated treatment will motivate some users to get better Quality de Service (QoS) for their flows however without assuming the associated costs, leadi...

متن کامل

Observations on Distributed Authentication and Authorization in Web Applications

A number of modern-day technologies, such as the LID, OpenID, and YADIS community efforts; the SXIP protocols; Microsoft's Infocard technology; and SAML, Liberty, and Shibboleth tackle various aspects of distributing user identity information (identifiers, credentials, attributes, and entitlements) across Internet domain boundaries. To varying degrees, they attempt to tackle two complementary g...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Trends in Computer Science and Engineering

سال: 2020

ISSN: 2278-3091

DOI: 10.30534/ijatcse/2020/5191.12020