Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
CryptoNET: Security Management Protocols
KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Machine Elements.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
2010 (English)In: ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS / [ed] Mastorakis, NE; Mladenov, V, ATHENS: WORLD SCIENTIFIC AND ENGINEERING ACAD AND SOC , 2010, 15-20 p.Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on well-established security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects. These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol. Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (NV) smart cards. It also manages protocols' attributes using security applets stored in Ply smart card.

Place, publisher, year, edition, pages
ATHENS: WORLD SCIENTIFIC AND ENGINEERING ACAD AND SOC , 2010. 15-20 p.
Series
Advances in Data Networks Communications Computers-Proceedings, ISSN 1792-6157
Keyword [en]
FIPS-201 (PIV) smart cards, mutual strong authentication, generic security objects, secure session, key management, authorization policies
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:kth:diva-39657ISI: 000291332400003Scopus ID: 2-s2.0-79959906796ISBN: 978-960-474-245-5 (print)OAI: oai:DiVA.org:kth-39657DiVA: diva2:440158
Conference
9th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO 10). Univ Algarve, Faro, PORTUGAL. NOV 03-05, 2010
Available from: 2011-09-12 Created: 2011-09-12 Last updated: 2012-02-29Bibliographically approved

Open Access in DiVA

No full text

Scopus

Search in DiVA

By author/editor
Abbasi, Abdul GhafoorMuftic, Sead
By organisation
Machine ElementsCommunication Systems, CoS
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 231 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf