IPSec-based delegation protocol and its application

被引:0
|
作者
Das, D [1 ]
机构
[1] Hewlett Packard Corp, STSD, Bangalore, Karnataka, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a key-management protocol for delegated trust between the user and a set of entities. The protocol is based on IPSec architecture. We draw a mapping from SPIs in IPSec architecture to users requesting a service spread across multiple hosts potentially in different administrative domains. We also outline the application and implementation of the protocol.
引用
下载
收藏
页码:74 / 79
页数:6
相关论文
共 50 条
  • [21] Enhanced Delegation-Based Authentication Protocol for PCSs
    Lee, Tian-Fu
    Chang, Shu-Hui
    Hwang, Tzonelih
    Chong, Song-Kong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2166 - 2171
  • [22] An Improved Delegation-Based Authentication Protocol for PCSs
    Lee, Cheng-Chi
    Chang, Rui-Xiang
    Chen, Te-Yu
    Chen, Lung Albert
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (03): : 258 - 267
  • [23] An application of the context transfer protocol: IPsec in a IPv6 mobility environment
    Allard, Fabien
    Bonnin, Jean-Marie
    2007 SECOND INTERNATIONAL CONFERENCE ON ACCESS NETWORKS & WORKSHOPS, 2007, : 210 - +
  • [24] Implementation and evaluation of message delegation middleware for ITS application
    Hattori, G
    Ono, C
    Nishiyama, S
    Horiuchi, H
    2004 INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2004, : 326 - 333
  • [25] An application of the context transfer protocol: IPsec in a IPv6 mobility environment
    Allard, Fabien
    Bonnin, Jean-Marie
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2008, 1 (01) : 110 - 126
  • [26] BCP-based joint delegation learning model and protocol
    Gao S.
    Xiang K.
    Tian Y.
    Tan W.
    Feng T.
    Wu X.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (05): : 137 - 148
  • [27] Rational Delegation Computing Protocol Based on Rational Trust Model
    Feng N.-X.
    Tian Y.-L.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (06): : 1910 - 1922
  • [28] Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs
    Gope, Prosanta
    Hwang, Tzonelih
    INFORMATION TECHNOLOGY AND CONTROL, 2015, 44 (03): : 329 - 333
  • [29] Proactive multicast-based IPSEC Discovery Protocol and multicast extension
    Tran, Trung H.
    MILCOM 2006, VOLS 1-7, 2006, : 1339 - 1345
  • [30] Rational Delegation Computation Protocol Based on Fully Homomorphic Encryption
    Li Q.-X.
    Tian Y.-L.
    Wang Z.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (02): : 470 - 474