ACM SIGOPS Operating Systems Review
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Using encryption for authentication in large networks of computers
Communications of the ACM
Programming Web Services with XML-RPC
Programming Web Services with XML-RPC
Lattice-Based Access Control Models
Computer
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
PlanetLab: an overlay testbed for broad-coverage services
ACM SIGCOMM Computer Communication Review
Telling humans and computers apart automatically
Communications of the ACM - Information cities
ORBIT Testbed Software Architecture: Supporting Experiments as a Service
TRIDENTCOM '05 Proceedings of the First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities
OpenID 2.0: a platform for user-centric identity management
Proceedings of the second ACM workshop on Digital identity management
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
International Journal of Security and Networks
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Efficient and secure password authentication schemes for low-power devices
International Journal of Sensor Networks
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
A self-encryption authentication protocol for teleconference services
International Journal of Security and Networks
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Secure target localisation in sensor networks using relaxation labelling
International Journal of Sensor Networks
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
User-aided data authentication
International Journal of Security and Networks
Computer Security: Principles and Practice
Computer Security: Principles and Practice
An efficient One-Time Password authentication scheme using a smart card
International Journal of Security and Networks
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
International Journal of Security and Networks
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
A cross-layer authentication design for secure video transportation in wireless sensor network
International Journal of Security and Networks
An emulation of GENI access control
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
Scatter – secure code authentication for efficient reprogramming in wireless sensor networks
International Journal of Sensor Networks
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
International Journal of Security and Networks
Improved IP Multimedia Subsystem authentication mechanism for 3G-WLAN networks
International Journal of Security and Networks
A source authentication scheme using network coding
International Journal of Security and Networks
Is that you? Authentication in a network without identities
International Journal of Security and Networks
Access control: principle and practice
IEEE Communications Magazine
Authentication and Access Control in the Internet of Things
ICDCSW '12 Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
International Journal of Security and Networks
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
A symmetric polynomial-based mutual authentication protocol for GSM networks
International Journal of Security and Networks
Cryptanalysis of an improved MFE public key cryptosystem
International Journal of Security and Networks
Towards an understanding of the impact of advertising on data leaks
International Journal of Security and Networks
Internet of things' authentication and access control
International Journal of Security and Networks
Hi-index | 0.00 |
The purpose of this paper is to investigate the authentication and access control mechanisms for Global Environment Network Innovation GENI. First, we will deliver an extensive survey of the existing authentication and access control techniques in general. We will then study how authentication and access control policies of GENI projects are implemented and how these mechanisms are integrated into the project control frameworks. Finally, we will summarise the advantages and disadvantages of the authentication and access control methods employed in GENI. We believe that the given review is valuable to those who are interested in the internal design of the current GENI security mechanisms.