A Chained Authentication Model for Virtual Organizations

نویسنده

  • Gavin Lowe
چکیده

Digital certificates (through the use of publickey cryptography) provide an entity the power to authenticate users even when the CA (Certification Authority) that issued the certificate is not on line. This authentication mechanism is widely used today in Virtual Organizations (VOs) to distribute the weight of the authentication. However, as shown in this paper, the use of public-key cryptography may dramatically reduce the performance of a system, and consequently reduce the performance of the VO if it is used to authenticate users at every node. Thus, we outline the specifications of a Virtual Organization, where public-key cryptography is used only for the initial authentication of nodes. To provide access to multiple resources in the VO, a Chained Authentication Model is proposed that makes use of a symmetric-key based three-party authentication protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

Towards a distributed authentication system in Coordinated Mobile Virtual Organizations

Authentication in Virtual Organizations is an acute problem, when the system does not want to use a centralized, open to failures authentication model. In this paper we outline the specifications of a Coordinated Mobile Virtual Organization, where the coordinators are responsible only for the “introduction” of the new mobile nodes, which can move freely (but continuously) from one member to ano...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

A Secure Model to Establish Trust Relationships in Web Services for Virtual Organizations

This paper introduces a model making use of the security proposals based on Web Services architecture that aims to provide guarantees authentication and authorization transfer among different security domains. The model describes a flexible, scalable and secure way to establish trust relationships among Virtual Organization partners and to assign the access rights or roles to each partner in th...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007