Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management

被引:0
|
作者
Hulsebosch, Bob [1 ]
de Groote, Robert [1 ]
Snijders, Martin [1 ]
机构
[1] Inst Telemat, NL-7500 AN Enschede, Netherlands
关键词
User centric; identity management; federation; lightpath provisioning; network resources; trust;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To allow user applications to securely make use of various lightpath resources distributed across multiple domains in a user-friendly and privacy-preserving way requires identity management functionality. Identity and attribute information has to be provided by the user to allow for authorized access to these resources. An identity management framework can facilitate such information exchange. We describe an architecture and prototype that allows the user to setup an end-to-end lightpath that spans multiple network domains while being in control of the personal credentials he has to provide for that purpose. The architecture combines the User-controlled lightpath paradigm with novel user-centric identity management technology. This combination allows the user transparent and non-intrusive access to multiple services that are required for reservation and utilization of network resources in order to setup ail end-to-end lightpath.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 50 条
  • [41] User-controlled collaborations in the context of trust extended environments
    Chan, Jonathan
    Nepal, Surya
    Moreland, David
    Hwang, Hon
    Chen, Shiping
    Zic, John
    WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2007, : 389 - 394
  • [42] A Language and Preprocessor for User-Controlled Generation of Synthetic Programs
    Chiu, Alton
    Garvey, Joseph
    Abdelrahman, Tarek S.
    SCIENTIFIC PROGRAMMING, 2017, 2017
  • [43] Visual analytics approach to user-controlled evacuation scheduling
    Andrienko, Gennady
    Andrienko, Natalia
    Bartling, Ulrich
    VAST: IEEE SYMPOSIUM ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY 2007, PROCEEDINGS, 2007, : 43 - 50
  • [44] Attribute-Based Signatures with User-Controlled Linkability
    El Kaafarani, Ali
    Chen, Liqun
    Ghadafi, Essam
    Davenport, James
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 256 - +
  • [45] USER-CONTROLLED COMMUNITY TECHNICAL AID - A SYMPOSIUM - INTRODUCTION
    FORSYTH, L
    TOWN PLANNING REVIEW, 1988, 59 (01): : 5 - 7
  • [46] USER-CONTROLLED COMMUNITY TECHNICAL AID - A SYMPOSIUM - CONCLUSION
    FORSYTH, L
    TOWN PLANNING REVIEW, 1988, 59 (01): : 43 - 44
  • [47] Reproducible and User-Controlled Software Environments in HPC with Guix
    Courtes, Ludovic
    Wurmus, Ricardo
    EURO-PAR 2015: PARALLEL PROCESSING WORKSHOPS, 2015, 9523 : 579 - 591
  • [48] KYChain: User-Controlled KYC Data Sharing and Certification
    Dragan, Constantin Catalin
    Manulis, Mark
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 301 - 307
  • [49] Exploring Recommendations Under User-Controlled Data Filtering
    Wen, Hongyi
    Yang, Longqi
    Sobolev, Michael
    Estrin, Deborah
    12TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS), 2018, : 72 - 76
  • [50] Evolution of the user controlled lightpath provisioning system
    Recio, J
    Grasa, E
    Figuerola, S
    Junyent, G
    2005 7th International Conference on Transparent Optical Networks, Vol 1, Proceedings, 2005, : 263 - 266