Open Access
CryptoNET: security management protocols
Abdul Ghafoor Abbasi,Sead Muftic +1 more
- pp 15-20
Reads0
Chats0
TLDR
Several network security protocols used by various components of CryptoNET architecture are described, including remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol, based on generic security objects.Abstract:
In this paper we describe several network security protocols used by various components of CryptoNET architecture The protocols are based on the concept of generic security objects and on well-established security standards and technologies Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (PIV) smart cards It also manages protocols' attributes using security applets stored in PIV smart cardread more
Citations
More filters
Journal ArticleDOI
Towards a secure service provisioning framework in a Smart city environment
TL;DR: A security and privacy-aware framework for service provisioning in smart cities, namely the ‘Smart Secure Service Provisioning’ (SSServProv) Framework is presented, which ensures inhabitants’ privacy, and also guarantees integrity of services.
Journal ArticleDOI
Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol
TL;DR: This paper describes an authentication and authorization protocol which outlines the main features of anonymous communication in the cloud and is an extension of existing standards making it easy to integrate and compatible with existing standards.
17 th International Conference in Knowledge Based and Intelligent Information and Engineering Systems - KES2013 Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol
TL;DR: In this article, the authors describe an authentication and authorization protocol which outlines the main features of anonymous communication in the cloud, which is an extension of existing standards making it easy to integrate and compatible with existing standards.
Journal ArticleDOI
SecureSurgiNET: A framework for ensuring security in telesurgery
Sohail Iqbal,Shahzad Farooq,Khuram Shahzad,Asad Waqar Malik,Asad Waqar Malik,Mian Muhammad Hamayun,Mian Muhammad Hamayun,Osman Hasan +7 more
TL;DR: This article proposes the first complete framework, called SecureSurgiNET, for ensuring security in telesurgery environments, primarily based on a set of well-established protocols to provide a fool-proof telesurgical robotic system.
CryptoNET : Generic Security Framework for Cloud Computing Environments
TL;DR: The area of this research is security in distributed environment such as cloud computing and network applications and specific focus was design and implementation of high assurance network environment.
References
More filters
Smart Card Security.
TL;DR: In this article, a description of the various attacks and countermeasures that apply to secure smart card applications is described, focusing on the attacks that could affect cryptographic algorithms and how these attacks can be applied to other security mechanisms.
Journal ArticleDOI
Business decision making, management and information technology
TL;DR: The relative paucity in the use of the best practice set can be attributed to lack awareness among IT practitioners, however the lack of ready-to-use tools also presents a significant barrier.
Journal Article
CryptoNET : integrated secure workstation
Abdul Ghafoor Abbasi,Sead Muftic +1 more
TL;DR: In most of the current applications security is usually provided individually, which means that various applications use their own security mechanisms and services, applied only to their own resourc ...