Enabling adaptive and secure extranets

نویسندگان

  • Yves Roudier
  • Olivier Fouache
  • Pierre Vannel
  • Refik Molva
چکیده

Extranets are tools that enable an organization to share part of its information system and infrastructure with other parties. Reaching this goal requires shielding from intruders while at the same time dynamically opening intranet resources. This article discusses how should such an extranet be designed. A solution that automates access control definition and enforcement is presented, which also addresses wide scale user management using a capability-based model. A prototype using the SPKI infrastructure is described that offers strong authentication thanks to smart cards.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building Secure High Speed Extranets

Extranets are a technology for creating logical views of geographically separate LANs by providing a transparent interconnection mechanism between them over a WAN As LAN bandwidths are typically higher than those of a WAN and LANs typically support stronger security features it is essential that extranets can be constructed to be both secure and high of speed The security of an extranet can be ...

متن کامل

Anti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication

In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...

متن کامل

Defense-Enabling Using Advanced Middleware: An Example

Many intrusions into computer systems target specific applications with an intent to stop them from functioning properly. The traditional security engineering approach attempts to secure the infrastructure: the hardware, the network and operating system, with the goal of preventing such attacks getting through to any application running on these platforms. We propose a complementary approach th...

متن کامل

Universally Composable Adaptive Oblivious Transfer

In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . ,MN and a Receiver with indices σ1, . . . , σk ∈ [1, N ] interact in such a way that at the end the Receiver obtains Mσ1 , . . . ,Mσk without learning anything about the other messages and the Sender does not learn anything about σ1, . . . , σk. In an adaptive protocol, the Receiver may obtain Mσi−1 before deciding on σi. ...

متن کامل

Semantic Interoperability of Authorizations

The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this shift is often limited to the internal operation of each entity because of the lack of security in the electronic communication mechanisms. Traditionally, these entities have managed their Local Area Networks (LANs) or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002