Change search
ReferencesLink to record
Permanent link

Direct link
CryptoNET: Security Management Protocols
KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Machine Elements.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
2010 (English)In: ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS / [ed] Mastorakis, NE; Mladenov, V, ATHENS: WORLD SCIENTIFIC AND ENGINEERING ACAD AND SOC , 2010, 15-20 p.Conference paper (Refereed)
Abstract [en]

In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on well-established security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects. These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol. Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (NV) smart cards. It also manages protocols' attributes using security applets stored in Ply smart card.

Place, publisher, year, edition, pages
, Advances in Data Networks Communications Computers-Proceedings, ISSN 1792-6157
Keyword [en]
FIPS-201 (PIV) smart cards, mutual strong authentication, generic security objects, secure session, key management, authorization policies
National Category
Computer and Information Science
URN: urn:nbn:se:kth:diva-39657ISI: 000291332400003ScopusID: 2-s2.0-79959906796ISBN: 978-960-474-245-5OAI: diva2:440158
9th WSEAS International Conference on Data Networks, Communications, Computers (DNCOCO 10). Univ Algarve, Faro, PORTUGAL. NOV 03-05, 2010
Available from: 2011-09-12 Created: 2011-09-12 Last updated: 2012-02-29Bibliographically approved

Open Access in DiVA

No full text


Search in DiVA

By author/editor
Abbasi, Abdul GhafoorMuftic, Sead
By organisation
Machine ElementsCommunication Systems, CoS
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 167 hits
ReferencesLink to record
Permanent link

Direct link