Sökning: "Delegation Protocol"

Hittade 3 avhandlingar innehållade orden Delegation Protocol.

  1. 1. On-demand Restricted Delegation : A Framework for Dynamic, Context-Aware, Least-Privilege Delegation in Grids

    Författare :Mehran Ahsant; Lennart Johnsson; Marty Humphrey; KTH; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Grid Security; Restricted and Context-Aware Delegation; Delegation Protocol; On-demand Delegation; Dynamic Trust Federation; Grid Interoperability; Credential Mapping; Computer science; Datalogi;

    Sammanfattning : In grids, delegation is a key facility that can be used to authenticate and authorize requests on behalf of disconnected users. In current grid systems,delegation is either performed dynamically, in an unrestricted manner, or by a secure but static method. LÄS MER

  2. 2. Digital Power of Attorney for authorization in industrial cyber-physical systems

    Författare :Sreelakshmi Vattaparambil Sudarsan; Simone Fisher Hübner; Luleå tekniska universitet; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyberfysiska system; Cyber-Physical Systems;

    Sammanfattning : In the age of digitization, many Cyber-Physical Systems are semi-autonomous and have sufficient power and resources to perform tasks on behalf of users. This thesis defines an authorization technique to transfer the power of legitimate users to trusted CPS or IoT devices, allowing the device to sign or access resources on behalf of the user. LÄS MER

  3. 3. Digital Power of Attorney for Authorization in Industrial Cyber-Physical Systems

    Författare :Sreelakshmi Vattaparambil Sudarsan; Olov Schelén; Ulf Bodin; Jerker Delsing; Panagiotis Papadimitratos; Luleå tekniska universitet; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Cyberfysiska system; Cyber-Physical Systems;

    Sammanfattning : Since ancient times, there has been a practice to authorize individuals that we trust. Today, we grant credentials and privileges digitally, making authorization a crucial part of security control and extending its use cases beyond people and web applications. LÄS MER