Trust establishment between OAuth 2.0 resource servers using claims-based authorization

2021 ◽  
Vol 17 (1) ◽  
pp. 1
Author(s):  
Edon Gashi ◽  
Blerim Rexha ◽  
Avni Rexhepi
Keyword(s):  
Sensors ◽  
2015 ◽  
Vol 15 (3) ◽  
pp. 7040-7061 ◽  
Author(s):  
Farruh Ishmanov ◽  
Sung Kim ◽  
Seung Nam

2018 ◽  
Vol 12 (03) ◽  
pp. 361-371
Author(s):  
Maha Ali Allouzi ◽  
Javed I. Khan

Software-Defined Networking (SDN) is being widely implemented by critical infrastructure networks, however providing security features still a challenge. In this work, we present SafeFlow an Automatic Trust Negotiation Protocol for SDN, a first line of defense and fine-grained authentication protocol, in order to deny the access of OpenFlow switches without valid digital credentials. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. One alternative approach to mutual trust establishment is Trust Negotiation, the bilateral exchange of digital credentials to establish trust gradually. The proposed protocol describes Trust Negotiation in OpenFlow protocol, probable extension to the OpenFlow handshake protocol. In this paper, we describe the implementation of SafeFlow. The proposed protocol ensures the security of the infrastructure itself, as there are also other proposals for developing security application on OpenFlow network infrastructure.


Author(s):  
Xuhua Ding ◽  
Liang Gu ◽  
Robert H. Deng ◽  
Bing Xie ◽  
Hong Mei

One of the key mechanisms for trust establishment among different platforms is remote attestation, which allows a platform to vouch for its trust related characteristics to a remote challenger. In this chapter, the authors propose a new conceptual model for remote attestation consisting of four basic ingredients: root of trust, attestation objective, object measurement, and attestation process. With this model, they present a systematic study on the remote attestation, including the methodologies applied for implementing the four elements and the principles for designing an attestation scheme. The authors also examine existing remote attestation schemes in the literature by grouping them into two main types: integrity attestation and quality attestation. They discuss both the strength and the limitations of each type of scheme and explain how they can be applied in trust management in distributed environment.


Sign in / Sign up

Export Citation Format

Share Document