Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A new paradigm for trusted systems
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Design of a trust model for a secure multi-agent marketplace
Proceedings of the fifth international conference on Autonomous agents
Developing trust in recommender agents
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Recent-secure authentication: enforcing revocation in distributed systems
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Efficient Information Propagation in Service Routing for Next Generation Network
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Hi-index | 0.00 |
When a service server receives a request, the server will establish the identity and authorization of the user based on the information stored in authentication information repository (IDAR) before service is provided. The IDAR will determine who can have access to which service. A legitimate user must have her/his identity and authorization registered in the IDAR in advance. Users who registered in IDAR of another server or network cannot access services in another server or network. This prevents effective and efficient sharing of services. In this paper, we develop a Network Service Sharing Infrastructure (NSSI) by which many networks are linked together for service sharing. This ad hoc network system can provide a wider range of services to users than any individual network. Within the ad hoc network system, individual networks authenticate and grant authorizations independent of each other by using their own IDAR. NSSI enables authentication and authorization results to be relayed to other linked networks to access a shared services while individual networks still maintain their own authentication scheme or authentication requirements. This makes joining and leaving NSSI simple and involves minimum administrative overhead.