Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management

被引:0
|
作者
Hulsebosch, Bob [1 ]
de Groote, Robert [1 ]
Snijders, Martin [1 ]
机构
[1] Inst Telemat, NL-7500 AN Enschede, Netherlands
关键词
User centric; identity management; federation; lightpath provisioning; network resources; trust;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To allow user applications to securely make use of various lightpath resources distributed across multiple domains in a user-friendly and privacy-preserving way requires identity management functionality. Identity and attribute information has to be provided by the user to allow for authorized access to these resources. An identity management framework can facilitate such information exchange. We describe an architecture and prototype that allows the user to setup an end-to-end lightpath that spans multiple network domains while being in control of the personal credentials he has to provide for that purpose. The architecture combines the User-controlled lightpath paradigm with novel user-centric identity management technology. This combination allows the user transparent and non-intrusive access to multiple services that are required for reservation and utilization of network resources in order to setup ail end-to-end lightpath.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [1] User-Controlled Identity Provisioning for Secure Account Sharing
    Liu, Dongxi
    Zic, John
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 644 - 651
  • [2] Security Enhancements for a User-Controlled Lightpath Provisioning System
    Wu, Jing
    Savoie, Michel
    Zhang, Hanxi
    Campbell, Scott
    2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 634 - +
  • [3] A user-controlled lightpath provisioning system for grid optical networks
    Wu, Jing
    Savoie, Michel
    Zhang, Hanxi
    Campbell, Scott
    2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 516 - +
  • [4] Unleashing the Disruptive Potential of User-Controlled Identity Management
    Minerva, Roberto
    Crespi, Noel
    2011 TECHNICAL SYMPOSIUM AT ITU TELECOM WORLD (ITU WT), 2011, : 1 - 6
  • [5] Marrying transparency tools with user-controlled identity management
    Hansen, Marit
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 199 - 220
  • [6] User-controlled kinematic modeling
    Sultan, IA
    Wager, JG
    ADVANCED ROBOTICS, 1999, 12 (06) : 663 - 677
  • [7] User-controlled resource management in federated clouds
    Mosch, Marc
    Gross, Stephan
    Schill, Alexander
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2014, 3 (03): : 1 - 18
  • [8] User-controlled kinematic modeling
    School of Engineering, University of Ballarat, PO Box 663, Ballarat, Vic. 3353, Australia
    不详
    Adv Rob, 6 (663-677):
  • [9] What user-controlled identity management should learn from communities
    Borcea-Pfitzmann, Katrin
    Hansen, Marit
    Liesebach, Katja
    Pfitzmann, Andreas
    Steinbrecher, Sandra
    Information Security Technical Report, 2006, 11 (03): : 119 - 128
  • [10] A unified framework for user-controlled simplification
    Hussain, M
    Okada, Y
    Niijima, K
    INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION, PROCEEDINGS, 2004, : 221 - 226