Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management

被引:0
|
作者
Hulsebosch, Bob [1 ]
de Groote, Robert [1 ]
Snijders, Martin [1 ]
机构
[1] Inst Telemat, NL-7500 AN Enschede, Netherlands
来源
SCALABILITY OF NETWORKS AND SERVICES, PROCEEDINGS | 2009年 / 5637卷
关键词
User centric; identity management; federation; lightpath provisioning; network resources; trust;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To allow user applications to securely make use of various lightpath resources distributed across multiple domains in a user-friendly and privacy-preserving way requires identity management functionality. Identity and attribute information has to be provided by the user to allow for authorized access to these resources. An identity management framework can facilitate such information exchange. We describe an architecture and prototype that allows the user to setup an end-to-end lightpath that spans multiple network domains while being in control of the personal credentials he has to provide for that purpose. The architecture combines the User-controlled lightpath paradigm with novel user-centric identity management technology. This combination allows the user transparent and non-intrusive access to multiple services that are required for reservation and utilization of network resources in order to setup ail end-to-end lightpath.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [11] A unified framework for user-controlled simplification
    Hussain, M
    Okada, Y
    Niijima, K
    INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION, PROCEEDINGS, 2004, : 221 - 226
  • [12] User-controlled simplification of polygonal models
    Hussain, M
    Okada, Y
    Niijima, K
    2ND INTERNATIONAL SYMPOSIUM ON 3D DATA PROCESSING, VISUALIZATION, AND TRANSMISSION, PROCEEDINGS, 2004, : 918 - 925
  • [13] Securing user-controlled routing infrastructures
    Lakshminarayanan, Karthik
    Adkins, Daniel
    Perrig, Adrian
    Stoica, Ion
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) : 549 - 561
  • [14] Ring Signatures with User-Controlled Linkability
    Fiore, Dario
    Garms, Lydia
    Kolonelos, Dimitris
    Soriente, Claudio
    Tucker, Ida
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 405 - 426
  • [15] Geosocial Query with User-Controlled Privacy
    Hu, Peizhao
    Chow, Sherman S. M.
    Aloufi, Asma
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 163 - 172
  • [16] User-controlled mapping of significant literatures
    White, HD
    Lin, X
    Buzydlowski, JW
    Chen, CM
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2004, 101 : 5297 - 5302
  • [17] Anonymous attestation with user-controlled linkability
    Bernhard, D.
    Fuchsbauer, G.
    Ghadafi, E.
    Smart, N. P.
    Warinschi, B.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (03) : 219 - 249
  • [18] User-controlled reflection on join points
    Embedded Systems Institute, Eindhoven, Netherlands
    不详
    J. Softw., 2007, 3 (1-8):
  • [19] THE CASE FOR THE USER-CONTROLLED MICRO COMPUTER
    GRAND, J
    JOURNAL OF SYSTEMS MANAGEMENT, 1981, 32 (09): : 34 - 34
  • [20] Anonymous attestation with user-controlled linkability
    D. Bernhard
    G. Fuchsbauer
    E. Ghadafi
    N. P. Smart
    B. Warinschi
    International Journal of Information Security, 2013, 12 : 219 - 249