Enabling adaptive and secure extranets
نویسندگان
چکیده
Extranets are tools that enable an organization to share part of its information system and infrastructure with other parties. Reaching this goal requires shielding from intruders while at the same time dynamically opening intranet resources. This article discusses how should such an extranet be designed. A solution that automates access control definition and enforcement is presented, which also addresses wide scale user management using a capability-based model. A prototype using the SPKI infrastructure is described that offers strong authentication thanks to smart cards.
منابع مشابه
Building Secure High Speed Extranets
Extranets are a technology for creating logical views of geographically separate LANs by providing a transparent interconnection mechanism between them over a WAN As LAN bandwidths are typically higher than those of a WAN and LANs typically support stronger security features it is essential that extranets can be constructed to be both secure and high of speed The security of an extranet can be ...
متن کاملAnti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication
In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...
متن کاملDefense-Enabling Using Advanced Middleware: An Example
Many intrusions into computer systems target specific applications with an intent to stop them from functioning properly. The traditional security engineering approach attempts to secure the infrastructure: the hardware, the network and operating system, with the goal of preventing such attacks getting through to any application running on these platforms. We propose a complementary approach th...
متن کاملUniversally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . ,MN and a Receiver with indices σ1, . . . , σk ∈ [1, N ] interact in such a way that at the end the Receiver obtains Mσ1 , . . . ,Mσk without learning anything about the other messages and the Sender does not learn anything about σ1, . . . , σk. In an adaptive protocol, the Receiver may obtain Mσi−1 before deciding on σi. ...
متن کاملSemantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this shift is often limited to the internal operation of each entity because of the lack of security in the electronic communication mechanisms. Traditionally, these entities have managed their Local Area Networks (LANs) or...
متن کامل