CryptoNET: Security Management Protocols
2010 (English)In: ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS / [ed] Mastorakis, NE; Mladenov, V, ATHENS: WORLD SCIENTIFIC AND ENGINEERING ACAD AND SOC , 2010, 15-20 p.Conference paper (Refereed)
In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on well-established security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects. These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol. Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (NV) smart cards. It also manages protocols' attributes using security applets stored in Ply smart card.
Place, publisher, year, edition, pages
ATHENS: WORLD SCIENTIFIC AND ENGINEERING ACAD AND SOC , 2010. 15-20 p.
, Advances in Data Networks Communications Computers-Proceedings, ISSN 1792-6157
FIPS-201 (PIV) smart cards, mutual strong authentication, generic security objects, secure session, key management, authorization policies
Computer and Information Science
IdentifiersURN: urn:nbn:se:kth:diva-39657ISI: 000291332400003ScopusID: 2-s2.0-79959906796ISBN: 978-960-474-245-5OAI: oai:DiVA.org:kth-39657DiVA: diva2:440158
9th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO 10). Univ Algarve, Faro, PORTUGAL. NOV 03-05, 2010