scispace - formally typeset
Open Access

CryptoNET: security management protocols

Reads0
Chats0
TLDR
Several network security protocols used by various components of CryptoNET architecture are described, including remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol, based on generic security objects.
Abstract
In this paper we describe several network security protocols used by various components of CryptoNET architecture The protocols are based on the concept of generic security objects and on well-established security standards and technologies Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (PIV) smart cards It also manages protocols' attributes using security applets stored in PIV smart card

read more

Citations
More filters
Journal ArticleDOI

Towards a secure service provisioning framework in a Smart city environment

TL;DR: A security and privacy-aware framework for service provisioning in smart cities, namely the ‘Smart Secure Service Provisioning’ (SSServProv) Framework is presented, which ensures inhabitants’ privacy, and also guarantees integrity of services.
Journal ArticleDOI

Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol

TL;DR: This paper describes an authentication and authorization protocol which outlines the main features of anonymous communication in the cloud and is an extension of existing standards making it easy to integrate and compatible with existing standards.

17 th International Conference in Knowledge Based and Intelligent Information and Engineering Systems - KES2013 Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol

TL;DR: In this article, the authors describe an authentication and authorization protocol which outlines the main features of anonymous communication in the cloud, which is an extension of existing standards making it easy to integrate and compatible with existing standards.
Journal ArticleDOI

SecureSurgiNET: A framework for ensuring security in telesurgery

TL;DR: This article proposes the first complete framework, called SecureSurgiNET, for ensuring security in telesurgery environments, primarily based on a set of well-established protocols to provide a fool-proof telesurgical robotic system.

CryptoNET : Generic Security Framework for Cloud Computing Environments

TL;DR: The area of this research is security in distributed environment such as cloud computing and network applications and specific focus was design and implementation of high assurance network environment.
References
More filters

Smart Card Security.

TL;DR: In this article, a description of the various attacks and countermeasures that apply to secure smart card applications is described, focusing on the attacks that could affect cryptographic algorithms and how these attacks can be applied to other security mechanisms.
Journal ArticleDOI

Business decision making, management and information technology

TL;DR: The relative paucity in the use of the best practice set can be attributed to lack awareness among IT practitioners, however the lack of ready-to-use tools also presents a significant barrier.
Journal Article

CryptoNET : integrated secure workstation

TL;DR: In most of the current applications security is usually provided individually, which means that various applications use their own security mechanisms and services, applied only to their own resourc ...
Related Papers (5)