Trusted Inter-Domain Fast Authentication Protocol in Split Mechanism Network
نویسندگان
چکیده
منابع مشابه
Design and analysis on trusted network equipment access authentication protocol
Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the tru...
متن کاملTopology Construction for Inter-Domain Network Protocol Simulations
Inter-domain network protocol simulations are often resource-demanding. A reduction of the inter-domain topology size can make the simulations more tractable. However, the simulations must yield results that are applicable to the real system. In this report, we describe a procedure for selecting a topology suitable for simulations of global, inter-domain protocols in the Internet. The procedure...
متن کاملAn Improved Authentication Protocol Without Trusted Third Party∗
This letter presents a secure authentication protocol which supports both the privacy of messages and the authenticity of the communicating parties. A scheme for extending a secure authentication protocol to improve the security of the communicating parties is also proposed.
متن کاملUnified Authentication Scheme Based on IBE in Trusted Network
The existing unified authentication schemes are based on Public Key Infrastructure (PKI)/Privilege Management Infrastructure (PMI), WS-Security, Kerberos etc. But they can't support the developing Trusted Network Connect (TNC) environment. To solve the problem, a unified authentication scheme supporting multi-authentication modes based on Identity-Based Encryption (IBE) in trusted network named...
متن کاملIdentity-based Trusted Authentication in Wireless Sensor Network
Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently many WSNs applications rely on trusted communication to ensure large user acceptance. Indeed, the trusted relationship thus far can only be achieved through Trust Management System (TMS) or by adding external security ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2012
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e95.d.2728