A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Formal Verification of the xDAuth Protocol
2016
IEEE Transactions on Information Forensics and Security
This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. ...
Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g., secure secret ...
Formal Verification of the xDAuth Protocol and to achieve interoperability among organizations having heterogeneous environments. ...
doi:10.1109/tifs.2016.2561909
fatcat:p6u3ujfwffbergpr6luzaspyvy
xDAuth
2011
Proceedings of the 16th ACM symposium on Access control models and technologies - SACMAT '11
In this paper, we present xDAuth, a framework for the realization of cross domain access control and delegation with RESTful web service architecture. ...
While focusing on real issues under the context of cross domain access scenarios such as no predefined trust relationship between a service provider domain and service requestor domain, xDAuth leverages ...
Figure 1 : 1 Overview of xDAuth.
Figure 2 : 2 xDAuth protocol. ...
doi:10.1145/1998441.1998447
dblp:conf/sacmat/AlamZKA11
fatcat:pm2ktwzp3zhnje3eh5aqg5l7ka
Resource Handling In Cloud Computing Environment Using Cross Tenant Access Control (Ctac) Model
2018
Zenodo
This paper formally specifies the resource sharing mechanism between two different tenants in the presence of proposed cloud resource meditation service. ...
Sharing of resources on the cloud can be achieved on large scale since it is cost effective and location independent. ...
This work focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. ...
doi:10.5281/zenodo.1320414
fatcat:a5xsfx7aordftkvqx6m4xudaui
Novel Modelling of the Hash-based Authentication of Data in Dynamic Cloud Environment
2021
International Journal of Advanced Computer Science and Applications
The experiment was carried on numerical computing tool considering, data volume, verification count and verification delay as prime performance metrics. ...
The design of proposed scheme is lightweight which offers cross-verifiable hash-based challenges matching scheme with the provision of the non-repudiation of the tractions using the inclusion of a cloud ...
[9] describe the cross-domain data authenticator, namely 'xDAuth' that fulfills the integrity and security protocols essentials.To overcome the effect of the denial of attack in geographical routing ...
doi:10.14569/ijacsa.2021.0120333
fatcat:whxndcyqubbmngc4v52nx3i77e
Improving the Open Stack Authentication system through federation with JASON Tokens
2019
International Journal of Advanced Trends in Computer Science and Engineering
, the addition of processes, etc. ...
A review of the Open stack systems is required to find the gaps that are existing to plug the same. ...
The protocol proposed by them supports verification of authentication for each of the services requested by the clients. ...
doi:10.30534/ijatcse/2019/143862019
fatcat:njkikbraxrdz7b74663catp55y