UAP: A unified authentication platform for IoT environment

2021 ◽  
Vol 188 ◽  
pp. 107811
Author(s):  
Fatma Hendaoui ◽  
Hamdi Eltaief ◽  
Habib Youssef
2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


LISS 2013 ◽  
2013 ◽  
pp. 983-990
Author(s):  
Shiliang Wu ◽  
Junwei Zou ◽  
Chunxiao Fan ◽  
Xiaoying Zhang

2014 ◽  
Vol 623 ◽  
pp. 258-261
Author(s):  
Pei Ying Fan ◽  
Yang Qiu

This article analysis the current situation of the virtual construction in university, which information non-sharing, poor safety and difficult management. Aiming at data diversification and the difference between platform, develop tools and system, making every network teaching resources system as an “information islet”, thus cause the disperse and independence of resources and data, integrate each resources system effectively by looking for a service governance structure. We proposed management system and method for private universities of long-term development. The main research is to set up the unified authentication system which can complete unified authentication and authority and administer. Using the virtual server technology, Information Office will set up a virtual campus portal platform with unified planning and concentration deployment, which is simple operation, advanced technology, safe and reliable, to realize unified management and guarantee the information resources interoperability and consistency.


2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Jhon Francined Herrera-Cubides ◽  
Paulo Alonso Gaona-García ◽  
Geiner Alexis Salcedo-Salgado

In LOD, authentication is a key factor in the security dimension of linked data quality models. This is the case of (a) LMS that manages open educational resources (OERs), in training process, and (b) LMS integrated platforms, which also require authenticating users. Authentication tackles a range of problems such as users forgetting passwords and time consumption in repetitive logins in different applications. In the context of linked OERs that are developed in LMS, it is necessary to design guidelines in order to carry out the authentication process. This process authorizes access to different linked resources platforms. Therefore, to provide abstraction methods for this authentication process, it is proposed to work with model-driven architecture (MDA) approach. This paper proposes a security abstraction model on LMS, based on MDA. The proposed metamodel seeks to provide a set of guidelines on how to carry out unified authentication, establishing a common dialogue among stakeholders. Conclusion and future work are proposed in order to generate authentication instances that allow access to resources managed in different platforms.


Sign in / Sign up

Export Citation Format

Share Document