Results 1 - 10
of
3,561
Authentication Authorization Calendar
, 2009
"... Version 1.1: 03/24/2009- Conference to subclass Folder This document describes the object model for Beehive. The document does not attempt to define the model in terms of an actual programming language. Instead, we describe the model using a concise abstract notation. Once we have specified the abst ..."
Abstract
- Add to MetaCart
Version 1.1: 03/24/2009- Conference to subclass Folder This document describes the object model for Beehive. The document does not attempt to define the model in terms of an actual programming language. Instead, we describe the model using a concise abstract notation. Once we have specified the abstract model, we will be able to define a programming language binding to the model.
A logic of authentication
- ACM TRANSACTIONS ON COMPUTER SYSTEMS
, 1990
"... Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required ..."
Abstract
-
Cited by 1332 (22 self)
- Add to MetaCart
Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required
Authentication, authorization, and accounting: Protocol evaluation
, 2001
"... Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice
Quality of Service Authentication, Authorization and Accounting
"... Abstract. Proper authorization is essential for a QoS signaling protocol. The policy control of future QoS signaling solutions is expected to make use of existing AAA infrastructure for computing the authorization decision. In this paper, we point to two approaches for QoS authorization (based on C ..."
Abstract
- Add to MetaCart
Abstract. Proper authorization is essential for a QoS signaling protocol. The policy control of future QoS signaling solutions is expected to make use of existing AAA infrastructure for computing the authorization decision. In this paper, we point to two approaches for QoS authorization (based
Guidance for Authentication, Authorization, and Accounting (AAA) Key Management
- BCP 132, RFC 4962, July 2007. Narayanan & Dondeti Standards Track [Page 41] 5296 ERP
, 2008
"... This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007). This document provides guidance to designers of Authenticatio ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
of Authentication, Authorization, and Accounting (AAA) key management protocols. The guidance is also useful to designers of systems and solutions that include AAA key management protocols. Given the complexity and difficulty in designing secure, long-lasting key management algorithms and protocols by experts
Abstract Authentication, Authorization, and Accounting (AAA) Goals
, 2009
"... service offered by a Mobility Services Provider (MSP). In this case, all protocol operations may need to be explicitly authorized and traced, requiring the interaction between Mobile IPv6 and the AAA infrastructure. Integrating the Authentication, Authorization, and Accounting (AAA) infrastructure ( ..."
Abstract
- Add to MetaCart
service offered by a Mobility Services Provider (MSP). In this case, all protocol operations may need to be explicitly authorized and traced, requiring the interaction between Mobile IPv6 and the AAA infrastructure. Integrating the Authentication, Authorization, and Accounting (AAA) infrastructure
Authentication, Authorization, Accounting, and Charging for the Mobile Internet
"... Mobile data services across the Internet pave the path for a society of tomorrow. Users will be able to access data, information, and services independent of their location. This will ease the way of business and private life, such as for the travelling field engineer repairing electronic devices at ..."
Abstract
- Add to MetaCart
features. An important one is the infrastructure for Authentication, Authorization, Accounting, and Charging (AAAC) those mobile services. These functions will ensure that mobility will not happen into places where not authorized and will enable a commercial operation of a network, which offers services
1 The 3 “A”s: Authentication, Authorization, Accounting
, 2005
"... For the road travelers in the United States, especially the parents who take their children in the family car on the long road trips, the letters AAA stand for a peace of mind. They feel that any time their car breaks down, they can call the number for the American Automobile Association and ask for ..."
Abstract
- Add to MetaCart
for roadside assistance. Even though this book is not about that sort of AAA, the 3 “A”s that we talk about here, when designed properly, can bring the same peace of mind to the network operator and its customers. Authentication, authorization, and accounting are three important blocks used in the construction
The anatomy of the Grid: Enabling scalable virtual organizations.
- The International Journal of High Performance Computing Applications
, 2001
"... Abstract "Grid" computing has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and, in some cases, high-performance orientation. In this article, we define this new field. First, ..."
Abstract
-
Cited by 2673 (86 self)
- Add to MetaCart
, we review the "Grid problem," which we define as flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources-what we refer to as virtual organizations. In such settings, we encounter unique authentication, authorization, resource
The physiology of the grid: An open grid services architecture for distributed systems integration
, 2002
"... In both e-business and e-science, we often need to integrate services across distributed, heterogeneous, dynamic “virtual organizations ” formed from the disparate resources within a single enterprise and/or from external resource sharing and service provider relationships. This integration can be t ..."
Abstract
-
Cited by 1377 (33 self)
- Add to MetaCart
, and notification. Service bindings can support reliable invocation, authentication, authorization, and delegation, if required. Our presentation complements an earlier foundational article, “The Anatomy of the Grid, ” by describing how Grid mechanisms can implement a service-oriented architecture, explaining how
Results 1 - 10
of
3,561