IPSec-based delegation protocol and its application

被引:0
|
作者
Das, D [1 ]
机构
[1] Hewlett Packard Corp, STSD, Bangalore, Karnataka, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a key-management protocol for delegated trust between the user and a set of entities. The protocol is based on IPSec architecture. We draw a mapping from SPIs in IPSec architecture to users requesting a service spread across multiple hosts potentially in different administrative domains. We also outline the application and implementation of the protocol.
引用
下载
收藏
页码:74 / 79
页数:6
相关论文
共 50 条
  • [31] A multi-layer IPsec protocol
    Zhang, YG
    Singh, B
    USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, 2000, : 213 - 228
  • [32] EFFICIENT DELEGATION-BASED AUTHENTICATION PROTOCOL WITH STRONG MOBILE PRIVACY
    Lu, Jian-Zhu
    Ren, Hong-Qing
    Zhou, Jiping
    2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 123 - 127
  • [33] Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
    Hsia-Hung Ou
    Min-Shiang Hwang
    Wireless Personal Communications, 2013, 72 : 437 - 446
  • [34] Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
    Ou, Hsia-Hung
    Hwang, Min-Shiang
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 72 (01) : 437 - 446
  • [35] Secure Delegation-Based Authentication Protocol for Wireless Roaming Service
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (07) : 1100 - 1102
  • [36] An enhanced secure delegation-based anonymous authentication protocol for PCSs
    Gope, Prosanta
    Ghayvat, Hemant
    Cheng, Yongqiang
    Kabir, Sohag
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (12)
  • [37] The design and application of data disaster recovery based on IPSec VPN
    Liu, Bo
    Wang, Wei
    Li, Wang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 281 - 283
  • [38] Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case
    Rui-dan, Su
    Xiang-quan, Che
    Shao-feng, Fu
    Long-hai, Li
    Li-hua, Zhou
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 719 - 723
  • [39] Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization
    Hsing-Bai Chen
    Yung-Hsiang Lai
    Kuei-Wan Chen
    Wei-Bin Lee
    Journal of Electronic Science and Technology, 2011, 9 (04) : 345 - 351
  • [40] An attribute-based delegation model and its extension
    Ye, CX
    Wu, ZF
    Fu, YQ
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2006, 38 (01): : 3 - 17