A Chained Authentication Model for Virtual Organizations
نویسنده
چکیده
Digital certificates (through the use of publickey cryptography) provide an entity the power to authenticate users even when the CA (Certification Authority) that issued the certificate is not on line. This authentication mechanism is widely used today in Virtual Organizations (VOs) to distribute the weight of the authentication. However, as shown in this paper, the use of public-key cryptography may dramatically reduce the performance of a system, and consequently reduce the performance of the VO if it is used to authenticate users at every node. Thus, we outline the specifications of a Virtual Organization, where public-key cryptography is used only for the initial authentication of nodes. To provide access to multiple resources in the VO, a Chained Authentication Model is proposed that makes use of a symmetric-key based three-party authentication protocol.
منابع مشابه
A combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملTowards a distributed authentication system in Coordinated Mobile Virtual Organizations
Authentication in Virtual Organizations is an acute problem, when the system does not want to use a centralized, open to failures authentication model. In this paper we outline the specifications of a Coordinated Mobile Virtual Organization, where the coordinators are responsible only for the “introduction” of the new mobile nodes, which can move freely (but continuously) from one member to ano...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA Secure Model to Establish Trust Relationships in Web Services for Virtual Organizations
This paper introduces a model making use of the security proposals based on Web Services architecture that aims to provide guarantees authentication and authorization transfer among different security domains. The model describes a flexible, scalable and secure way to establish trust relationships among Virtual Organization partners and to assign the access rights or roles to each partner in th...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007