Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key

作者: David Presotto , Ankur Taly , Asim Shankar , Gautham Thambidorai

DOI:

关键词:

摘要: A client device communicates with a target entity server and one or more third party devices. The has credential that includes public key certificate chain. chain of human-readable names. delegates access to service on the by creating delegate for device. is bound name an extension selected also may include section identifies transmits otherwise presents

参考文章(61)
Messaoud Benantar, David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa, Authentication and authorization methods for cloud computing security platform ,(2011)
Ari Vepsäläinen, Tapani Lumme, Jussi Mäki, Distributed authentication with data cloud ,(2010)
Venkata S. Evani, Ching-Wen Chu, Ajay Sondhi, Bundled authorization requests ,(2014)
Jorge Pereira, Karim Michel Batthish, Roy Williams, Delegating certificate validation ,(2003)
Gabor Marton, Miklos Tamas Bodi, Lorant Farkas, Adam Gabor, Method for controlling acess to resources ,(2010)