Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








5 Hits in 2.5 sec

Formal Verification of the xDAuth Protocol

Quratulain Alam, Saher Tabbasum, Saif Malik, Masoom Alam, Tamleek Tanveer, Adnan Akhunzada, Samee Khan, Athanasios Vasilakos, Rajkumar Buyya
2016 IEEE Transactions on Information Forensics and Security  
This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios.  ...  Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g., secure secret  ...  Formal Verification of the xDAuth Protocol and to achieve interoperability among organizations having heterogeneous environments.  ... 
doi:10.1109/tifs.2016.2561909 fatcat:p6u3ujfwffbergpr6luzaspyvy

xDAuth

Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
2011 Proceedings of the 16th ACM symposium on Access control models and technologies - SACMAT '11  
In this paper, we present xDAuth, a framework for the realization of cross domain access control and delegation with RESTful web service architecture.  ...  While focusing on real issues under the context of cross domain access scenarios such as no predefined trust relationship between a service provider domain and service requestor domain, xDAuth leverages  ...  Figure 1 : 1 Overview of xDAuth. Figure 2 : 2 xDAuth protocol.  ... 
doi:10.1145/1998441.1998447 dblp:conf/sacmat/AlamZKA11 fatcat:pm2ktwzp3zhnje3eh5aqg5l7ka

Resource Handling In Cloud Computing Environment Using Cross Tenant Access Control (Ctac) Model

D. Dhanya, R. S. Akhila, Aparna Jose, R. P. Bincy Raj
2018 Zenodo  
This paper formally specifies the resource sharing mechanism between two different tenants in the presence of proposed cloud resource meditation service.  ...  Sharing of resources on the cloud can be achieved on large scale since it is cost effective and location independent.  ...  This work focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios.  ... 
doi:10.5281/zenodo.1320414 fatcat:a5xsfx7aordftkvqx6m4xudaui

Novel Modelling of the Hash-based Authentication of Data in Dynamic Cloud Environment

Anil Kumar G, Shantala C.P
2021 International Journal of Advanced Computer Science and Applications  
The experiment was carried on numerical computing tool considering, data volume, verification count and verification delay as prime performance metrics.  ...  The design of proposed scheme is lightweight which offers cross-verifiable hash-based challenges matching scheme with the provision of the non-repudiation of the tractions using the inclusion of a cloud  ...  [9] describe the cross-domain data authenticator, namely 'xDAuth' that fulfills the integrity and security protocols essentials.To overcome the effect of the denial of attack in geographical routing  ... 
doi:10.14569/ijacsa.2021.0120333 fatcat:whxndcyqubbmngc4v52nx3i77e

Improving the Open Stack Authentication system through federation with JASON Tokens

M Trinath Basu
2019 International Journal of Advanced Trends in Computer Science and Engineering  
, the addition of processes, etc.  ...  A review of the Open stack systems is required to find the gaps that are existing to plug the same.  ...  The protocol proposed by them supports verification of authentication for each of the services requested by the clients.  ... 
doi:10.30534/ijatcse/2019/143862019 fatcat:njkikbraxrdz7b74663catp55y