A credential-based data path architecture for assurable global networking

被引:0
|
作者
Wolf, Tilman [1 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
来源
2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8 | 2007年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The main limitation for achieving information assurance in current data networks ties in absence of security considerations in the original Internet architecture. This shortcoming leads to the need for a new approach to achieving information assurance in networks. We propose a network architecture that uses credentials in the data path to identify, validate, monitor, and control data flows within the network. The important aspect of this approach is that credentials are tracked on the data path of the network, not just the end-systems, which implies that each and every packet can be audited. We present a credentials design that is based on Bloom filters and can achieve the desired properties to provide data path assurance.
引用
收藏
页码:3051 / 3057
页数:7
相关论文
共 50 条
  • [1] A credential-based system for the anonymous delegation of rights
    Demuynck, Liesje
    De Decker, Bart
    Joosen, Wouter
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 169 - +
  • [2] Safe credential-based trust protocols: A framework
    Almuhammadi, Sultan
    Sui, Nien T.
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE, (WI 2006 MAIN CONFERENCE PROCEEDINGS), 2006, : 949 - +
  • [3] A credential-based security mechanism for object storage
    Li, Zhongmin
    Yu, Zhanwu
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1610 - +
  • [4] Clustering subjects in a credential-based access control framework
    Stoupa, K.
    Vakali, A.
    COMPUTERS & SECURITY, 2007, 26 (02) : 120 - 129
  • [5] Anonymous Credential-Based Access Control Scheme for Clouds
    Yao, Xuanxia
    Liu, Hong
    Ning, Huansheng
    Yang, Laurence T.
    Xiang, Yang
    IEEE CLOUD COMPUTING, 2015, 2 (04): : 34 - 43
  • [6] Towards Credential-based Device Registration in DApps for DePINs with ZKPs
    Heiss, Jonathan
    Castillo, Fernando
    Fan, Xinxin
    2024 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN 2024, 2024, : 583 - 590
  • [7] Constant-Size Credential-Based Packet Forwarding Verification in SDN
    Wu, Ping
    Chang, Chao-Wen
    Ma, Ying-Ying
    Zuo, Zhi-Bin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] A Credential and Encryption Based Access Control Solution for Named Data Networking
    Hamdane, Balkis
    El Fatmi, Sihem Guemara
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1234 - 1237
  • [9] An efficient credential-based scheme for cross-domain file sharing
    Chen, Lanxiang
    Feng, Dan
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 614 - +
  • [10] Credential-based policies management in an access control framework protecting XML resources
    Stoupa, Konstantina
    Simeoforidis, Zisis
    Vakali, Athena
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 603 - +