IPSec-based delegation protocol and its application

被引:0
|
作者
Das, D [1 ]
机构
[1] Hewlett Packard Corp, STSD, Bangalore, Karnataka, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a key-management protocol for delegated trust between the user and a set of entities. The protocol is based on IPSec architecture. We draw a mapping from SPIs in IPSec architecture to users requesting a service spread across multiple hosts potentially in different administrative domains. We also outline the application and implementation of the protocol.
引用
下载
收藏
页码:74 / 79
页数:6
相关论文
共 50 条
  • [41] SMUX protocol and its application
    Jisuanji Gongcheng, 9 (32-34):
  • [42] Initialization vector attacks on the IPsec protocol suite
    McCubbin, CB
    Selçuk, AA
    Sidhu, D
    IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 171 - 175
  • [43] A New Scalable RFID Delegation Protocol
    Chen, Xiuqing
    Cao, Tianjie
    Guo, Yu
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (04): : 1917 - 1924
  • [44] Research and Application of IPSec VPN
    Ma Shuyue
    Wang Jian
    2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 101 - 105
  • [45] Traffic flow confidentiality in IPsec: Protocol and implementation
    University of Trento, Italy
    不详
    IFIP Advances in Information and Communication Technology, 2008, (311-324)
  • [46] Verifying a delegation protocol for grid systems
    Aziz, Benjamin
    Hamilton, Geoff
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2011, 27 (05): : 476 - 485
  • [47] Performance analysis of IPSec protocol: Encryption and authentication
    Elkeelany, O
    Matalgah, MM
    Sheikh, KP
    Thaker, M
    Chaudhry, G
    Medhi, D
    Qaddour, J
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1164 - 1168
  • [48] Simplified IPsec protocol stack for micro server
    Hoa, Nguyen Thanh
    Naoe, Kensuke
    Takefuji, Yoshiyasu
    International Journal of Network Security, 2010, 11 (01) : 46 - 54
  • [49] Traffic Flow Confidentiality in IPsec: Protocol and implementation
    Kiraly, Csaba
    Teofili, Simone
    Bianchi, Giuseppe
    Lo Cigno, Renato
    Nardelli, Matteo
    Delzeri, Emanuele
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 311 - +
  • [50] A FIPA compliant goal delegation protocol
    Bergenti, F
    Rimassa, G
    Somacher, M
    Botelho, LM
    COMMUNICATION IN MULTIAGENT SYSTEMS: AGENT COMMUNICATION LANGUAGES AND CONVERSATION POLICIES, 2003, 2650 : 223 - 238