首页 > 最新文献

2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference最新文献

英文 中文
Formal Specification and Verification of an Extended Security Policy Model for Database Systems 数据库系统扩展安全策略模型的形式化规范与验证
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.22
Zhu Hong, Zhu Yi, Lingxi Chenyang, Shi Jie, Fu Ge, Wang Yuanzhen
In order to develop highly secure database systems to meet the requirements for class B2, an extended formal security policy model based on the BLP model is presented in this paper. A method for verifying security model for database systems is proposed. According to this method, the development of a formal specification and verification to ensure the security of the extended model is introduced. During the process of the verification, a number of mistakes have been identified and corrections have been made. Both the specification and verification are developed in Coq proof assistant. Our formal security model was improved and has been verified secure. This work demonstrates that our verification method is effective and sufficient and illustrates the necessity for formal verification of the extended model by using tools.
为了开发满足B2类要求的高度安全的数据库系统,本文在BLP模型的基础上提出了一种扩展的形式化安全策略模型。提出了一种验证数据库系统安全模型的方法。在此基础上,介绍了扩展模型的形式化规范的制定和验证,以保证扩展模型的安全性。在核查过程中,发现了一些错误,并作出了纠正。规范和验证都是在Coq proof assistant中开发的。我们的正式安全模型得到了改进,并已被验证是安全的。这项工作证明了我们的验证方法是有效和充分的,并说明了使用工具对扩展模型进行形式化验证的必要性。
{"title":"Formal Specification and Verification of an Extended Security Policy Model for Database Systems","authors":"Zhu Hong, Zhu Yi, Lingxi Chenyang, Shi Jie, Fu Ge, Wang Yuanzhen","doi":"10.1109/APTC.2008.22","DOIUrl":"https://doi.org/10.1109/APTC.2008.22","url":null,"abstract":"In order to develop highly secure database systems to meet the requirements for class B2, an extended formal security policy model based on the BLP model is presented in this paper. A method for verifying security model for database systems is proposed. According to this method, the development of a formal specification and verification to ensure the security of the extended model is introduced. During the process of the verification, a number of mistakes have been identified and corrections have been made. Both the specification and verification are developed in Coq proof assistant. Our formal security model was improved and has been verified secure. This work demonstrates that our verification method is effective and sufficient and illustrates the necessity for formal verification of the extended model by using tools.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132159836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Practical Solution to Trusted Computing Platform Testing 可信计算平台测试的实用解决方案
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.20
Huanguo Zhang, Jie Luo, Fei Yan, Mingdi Xu, Fan He, Jing Zhan
Trusted computing is a new generation technology of secure computing environment proposed by trusted computing group (TCG). Although many TC vendors claim that their products are compliant to TCG specifications, itpsilas very difficult to affirm it. Moreover, according to some government regulations on security, TC products shall require the official approval. Thus the testing and evaluation on TC products are necessary. Especially, there is no a prototype with full testing on whole TC products. Aiming at these issues, we proposed a testing prototype to make up for the gap between TCG specifications and product implementations. We introduced the automata theory as test mechanism to achieve TPM specification compliance test, validate chain of trust compliance by analyzing TCG-BIOS, and use reflection mechanism to test each layer of TSS. As a result, our test shows that some popular trusted PCs donpsilat meet the TCG specification includes TPM, TCG-BIOS and TSS.
可信计算是可信计算组(TCG)提出的新一代安全计算环境技术。尽管许多TC供应商声称他们的产品符合TCG规范,但很难证实这一点。此外,根据政府对安全的一些规定,TC产品需要官方批准。因此,对TC产品进行测试和评价是必要的。特别是,目前还没有对整个TC产品进行全面测试的原型。针对这些问题,我们提出了一个测试原型来弥补TCG规范和产品实现之间的差距。引入自动机理论作为测试机制,实现TPM规范符合性测试,通过分析TCG-BIOS验证信任符合性链,并利用反射机制对TSS各层进行测试。因此,我们的测试表明,一些流行的可信pc不符合TCG规范,包括TPM、TCG- bios和TSS。
{"title":"A Practical Solution to Trusted Computing Platform Testing","authors":"Huanguo Zhang, Jie Luo, Fei Yan, Mingdi Xu, Fan He, Jing Zhan","doi":"10.1109/APTC.2008.20","DOIUrl":"https://doi.org/10.1109/APTC.2008.20","url":null,"abstract":"Trusted computing is a new generation technology of secure computing environment proposed by trusted computing group (TCG). Although many TC vendors claim that their products are compliant to TCG specifications, itpsilas very difficult to affirm it. Moreover, according to some government regulations on security, TC products shall require the official approval. Thus the testing and evaluation on TC products are necessary. Especially, there is no a prototype with full testing on whole TC products. Aiming at these issues, we proposed a testing prototype to make up for the gap between TCG specifications and product implementations. We introduced the automata theory as test mechanism to achieve TPM specification compliance test, validate chain of trust compliance by analyzing TCG-BIOS, and use reflection mechanism to test each layer of TSS. As a result, our test shows that some popular trusted PCs donpsilat meet the TCG specification includes TPM, TCG-BIOS and TSS.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131978438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and Implementation of the TPM Chip J3210 TPM芯片J3210的设计与实现
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.8
Huanguo Zhang, Zhongping Qin, Yang Qi
During these years, computer security is in expeditious progressing. With the serious risk of security, the idea of Trusted Computing was introduced to the Information Technology industry. Trusted Computing has to ensure the computing is on the trusted platforms, so the technology of Trusted Computing Platform (TCP) was developed. In the specification of Trusted Computing Group (TCG), Trusted Platform Module (TPM) can be used to ensure that each computer will report its configuration parameters in a trustworthy manner. The cryptographic operations are all taking place in TPM, such as the measurement of Operation System, the encryption process, and the process of personal identification. These kinds of operations need huge computing power. Besides, these operations have to be done in TPM totally under the consideration of security. It is obviously a TPM chip should offer sufficient computing power to do these kinds of operations; otherwise the performance of trusted computing would descend seriously. In this paper, a high performance TPM chip J3210 based on SPARC v8 is designed and implemented. This high performance TPM chip J3210 consists of a high performance RISC CPU, a RSA/ECC cryptographic acceleration engine, a hash engine, a symmetric cryptographic acceleration engine, a random number generator and some peripheral interfaces. These internal Intellectual Property (IP) cores are elaborately designed and carefully configured. As a result, it demonstrates a high performance of cryptographic operations.
这些年来,计算机安全正在迅速发展。随着安全风险的日益严重,可信计算的思想被引入信息技术行业。可信计算必须保证计算是在可信的平台上进行的,因此开发了可信计算平台(TCP)技术。在可信计算组(TCG)规范中,可以使用可信平台模块(TPM)来确保每台计算机以可信的方式报告其配置参数。加密操作都是在TPM中进行的,如操作系统的度量、加密过程、个人身份识别过程等。这类操作需要巨大的计算能力。此外,这些操作必须完全在安全考虑的情况下在TPM中进行。显然,TPM芯片应该提供足够的计算能力来完成这些操作;否则,可信计算的性能将严重下降。本文设计并实现了基于SPARC v8的高性能TPM芯片J3210。高性能TPM芯片J3210由高性能RISC CPU、RSA/ECC加密加速引擎、哈希引擎、对称加密加速引擎、随机数生成器和一些外围接口组成。这些内部知识产权(IP)核心经过精心设计和精心配置。因此,它展示了高性能的加密操作。
{"title":"Design and Implementation of the TPM Chip J3210","authors":"Huanguo Zhang, Zhongping Qin, Yang Qi","doi":"10.1109/APTC.2008.8","DOIUrl":"https://doi.org/10.1109/APTC.2008.8","url":null,"abstract":"During these years, computer security is in expeditious progressing. With the serious risk of security, the idea of Trusted Computing was introduced to the Information Technology industry. Trusted Computing has to ensure the computing is on the trusted platforms, so the technology of Trusted Computing Platform (TCP) was developed. In the specification of Trusted Computing Group (TCG), Trusted Platform Module (TPM) can be used to ensure that each computer will report its configuration parameters in a trustworthy manner. The cryptographic operations are all taking place in TPM, such as the measurement of Operation System, the encryption process, and the process of personal identification. These kinds of operations need huge computing power. Besides, these operations have to be done in TPM totally under the consideration of security. It is obviously a TPM chip should offer sufficient computing power to do these kinds of operations; otherwise the performance of trusted computing would descend seriously. In this paper, a high performance TPM chip J3210 based on SPARC v8 is designed and implemented. This high performance TPM chip J3210 consists of a high performance RISC CPU, a RSA/ECC cryptographic acceleration engine, a hash engine, a symmetric cryptographic acceleration engine, a random number generator and some peripheral interfaces. These internal Intellectual Property (IP) cores are elaborately designed and carefully configured. As a result, it demonstrates a high performance of cryptographic operations.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"60 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection PALM:针对vmm强制保护系统的安全保护虚拟机热迁移
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.15
Fengzhe Zhang, Yijian Huang, Huihong Wang, Haibo Chen, B. Zang
Live migration of virtual machine (VM) is a desirable feature for distributed computing such as grid computing and recent cloud computing by facilitating fault tolerance, load balance, and hardware maintenance. Virtual machine monitor (VMM) enforced process protection is a newly advocated approach to provide a trustworthy execution environment for processes running on commodity operating systems.While VMM-enforced protection systems extend protection to the processes in the virtual machine (VM), it also breaks the mobility of VMs since a VM is more closely bound to the VMM. Furthermore, several security vulnerabilities exists in migration, especially live migration of such systems that may degrade the protection strength or even break the protection.In this paper, we propose a secure migration system that provides live migration capability to VMs in VMM-enforced process protection systems, while not degrading the protection level. We implemented a prototype system base on Xen and GNU Linux to evaluate the design. The results shows that no serious performance degradation is incurred comparing to Xen live migration system.
虚拟机(VM)的实时迁移是分布式计算(如网格计算和最近的云计算)的理想特性,它有助于容错、负载平衡和硬件维护。虚拟机监视器(VMM)强制进程保护是一种新提倡的方法,它为运行在商用操作系统上的进程提供可信的执行环境。虽然VMM强制保护系统将保护扩展到虚拟机(VM)中的进程,但它也破坏了虚拟机的可移动性,因为虚拟机与VMM的绑定更紧密。此外,在迁移过程中还存在一些安全漏洞,特别是对此类系统的实时迁移,可能会降低保护强度,甚至破坏保护。在本文中,我们提出了一种安全迁移系统,该系统在不降低保护级别的情况下,为vmm强制过程保护系统中的vm提供实时迁移功能。我们实现了一个基于Xen和GNU Linux的原型系统来评估设计。结果表明,与Xen实时迁移系统相比,没有出现严重的性能下降。
{"title":"PALM: Security Preserving VM Live Migration for Systems with VMM-enforced Protection","authors":"Fengzhe Zhang, Yijian Huang, Huihong Wang, Haibo Chen, B. Zang","doi":"10.1109/APTC.2008.15","DOIUrl":"https://doi.org/10.1109/APTC.2008.15","url":null,"abstract":"Live migration of virtual machine (VM) is a desirable feature for distributed computing such as grid computing and recent cloud computing by facilitating fault tolerance, load balance, and hardware maintenance. Virtual machine monitor (VMM) enforced process protection is a newly advocated approach to provide a trustworthy execution environment for processes running on commodity operating systems.While VMM-enforced protection systems extend protection to the processes in the virtual machine (VM), it also breaks the mobility of VMs since a VM is more closely bound to the VMM. Furthermore, several security vulnerabilities exists in migration, especially live migration of such systems that may degrade the protection strength or even break the protection.In this paper, we propose a secure migration system that provides live migration capability to VMs in VMM-enforced process protection systems, while not degrading the protection level. We implemented a prototype system base on Xen and GNU Linux to evaluate the design. The results shows that no serious performance degradation is incurred comparing to Xen live migration system.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Multi-tenant Cloud Computing: From Cruise Liners to Container Ships 多租户云计算:从邮轮到集装箱船
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.16
B. Kaliski
As a multi-tenant service, cloud computing may be compared to container ships and cruise lines, which also provide services to large numbers of independent customers. To be cost-effective, cloud computing needs to be more like container shipping, with standardized containers, optimized costs, and automated assurances of non-interference from other cargo. Trusted infrastructures offer key technology elements that deliver these assurances.
作为一种多租户服务,云计算可以与集装箱船和游轮相提并论,后者也为大量独立客户提供服务。为了节省成本,云计算需要更像集装箱运输,具有标准化的集装箱、优化的成本和不受其他货物干扰的自动化保证。受信任的基础设施提供提供这些保证的关键技术元素。
{"title":"Multi-tenant Cloud Computing: From Cruise Liners to Container Ships","authors":"B. Kaliski","doi":"10.1109/APTC.2008.16","DOIUrl":"https://doi.org/10.1109/APTC.2008.16","url":null,"abstract":"As a multi-tenant service, cloud computing may be compared to container ships and cruise lines, which also provide services to large numbers of independent customers. To be cost-effective, cloud computing needs to be more like container shipping, with standardized containers, optimized costs, and automated assurances of non-interference from other cargo. Trusted infrastructures offer key technology elements that deliver these assurances.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124518977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks 利用可信计算技术促进无线传感器网络的安全实施
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.13
Yanjiang Yang, Robert H. Deng, F. Bao, Jianying Zhou
Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station. As such, the SEFs act as online trusted third parties to effectively monitor the states of sensor nodes, help in key management, simplify secure routing, and facilitate access control.
由于传感器节点固有的资源约束性质,无线传感器网络中的安全实施绝不是一项容易的任务。为了促进安全执法,我们建议在无线传感器网络中加入更强大的高端安全执法促进者(sef)。特别是,sef配备了符合tcg标准的可信平台模块(TPMs),以保护加密秘密,执行身份验证启动,并向远程基站证明其平台状态。因此,sef作为在线可信第三方,可以有效地监控传感器节点的状态,帮助进行密钥管理,简化安全路由,方便访问控制。
{"title":"Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks","authors":"Yanjiang Yang, Robert H. Deng, F. Bao, Jianying Zhou","doi":"10.1109/APTC.2008.13","DOIUrl":"https://doi.org/10.1109/APTC.2008.13","url":null,"abstract":"Security enforcement in wireless sensor networks is by no means an easy task, due to the inherent resource-constrained nature of sensor nodes. To facilitate security enforcement, we propose to incorporate more powerful high-end Security Enforcement Facilitators (SEFs) into wireless sensor networks. In particular, the SEFs are equipped with TCG-compliant Trusted Platform Modules (TPMs) to protect cryptographic secrets, perform authenticated booting and attest their platform state to a remote base station. As such, the SEFs act as online trusted third parties to effectively monitor the states of sensor nodes, help in key management, simplify secure routing, and facilitate access control.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Trusted Boot and Platform Trust Services on 1CD Linux 1CD Linux上的可信引导和平台信任服务
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.23
K. Suzaki, K. Iijima, T. Yagi, Nguyen Anh Quynh
We developed 1CD Linux which shows the benefit of trusted computing. It includes Trusted Boot and Platform Trust Services, which use a secure chip "TPM" and are hardware rooted trust. The integrity of platform and vulnerability of packages are verified by the remote attestation. The 1CD Linux includes Union File System, which keeps the keys of TPM and the updated applications for next boot time. User can customize the OS and verify the vulnerability. We also offer the virtual machine "Xen-HVM" which supportsa virtual TPM. The virtual machine does not depend on a physical TPM and makes possible to try the feasibility of trusted computing on many PCs. The ready-to-use environment makes easy to understand the trusted computing and increases the awareness.
我们开发了1CD Linux,它展示了可信计算的好处。它包括可信引导和平台信任服务,它们使用安全芯片“TPM”,是基于硬件的信任。通过远程认证验证平台的完整性和软件包的脆弱性。1CD Linux包括Union File System,它保存TPM的密钥和更新的应用程序,以备下次启动时使用。用户可以自定义操作系统并验证漏洞。我们还提供支持虚拟TPM的虚拟机“Xen-HVM”。虚拟机不依赖于物理TPM,因此可以在许多pc上尝试可信计算的可行性。随时可用的环境便于理解可信计算并提高意识。
{"title":"Trusted Boot and Platform Trust Services on 1CD Linux","authors":"K. Suzaki, K. Iijima, T. Yagi, Nguyen Anh Quynh","doi":"10.1109/APTC.2008.23","DOIUrl":"https://doi.org/10.1109/APTC.2008.23","url":null,"abstract":"We developed 1CD Linux which shows the benefit of trusted computing. It includes Trusted Boot and Platform Trust Services, which use a secure chip \"TPM\" and are hardware rooted trust. The integrity of platform and vulnerability of packages are verified by the remote attestation. The 1CD Linux includes Union File System, which keeps the keys of TPM and the updated applications for next boot time. User can customize the OS and verify the vulnerability. We also offer the virtual machine \"Xen-HVM\" which supportsa virtual TPM. The virtual machine does not depend on a physical TPM and makes possible to try the feasibility of trusted computing on many PCs. The ready-to-use environment makes easy to understand the trusted computing and increases the awareness.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trusted Connection between Mobile Nodes and Mobility Anchor Points in Hierarchical Mobile IPv6 分层移动IPv6中移动节点与移动锚点之间的可信连接
Pub Date : 2008-10-14 DOI: 10.1109/APTC.2008.21
Y. Qiu, Jianying Zhou, K. Sakurai, F. Bao
This paper proposes solutions for the trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6. Two operation modes are supported for different scenarios: The first one is authentication-only mode for the scenario that the mobility anchor point only needs to ensure any binding update messages are from the claimed mobile nodes. The second one is authentication and authorization mode for the scenario that the mobility anchor point and mobile node need to authenticate each other and the mobility anchor point also needs to know if the mobile node is authorized for using it.
提出了分层移动IPv6中移动节点与移动锚点之间可信连接的解决方案。不同的场景支持两种操作模式:第一种是仅用于场景的身份验证模式,移动性锚点只需要确保任何绑定更新消息来自已声明的移动节点。第二种是针对移动锚点和移动节点需要相互认证,并且移动锚点还需要知道移动节点是否被授权使用的场景的身份验证和授权模式。
{"title":"Trusted Connection between Mobile Nodes and Mobility Anchor Points in Hierarchical Mobile IPv6","authors":"Y. Qiu, Jianying Zhou, K. Sakurai, F. Bao","doi":"10.1109/APTC.2008.21","DOIUrl":"https://doi.org/10.1109/APTC.2008.21","url":null,"abstract":"This paper proposes solutions for the trusted connection between mobile nodes and mobility anchor points in hierarchical mobile IPv6. Two operation modes are supported for different scenarios: The first one is authentication-only mode for the scenario that the mobility anchor point only needs to ensure any binding update messages are from the claimed mobile nodes. The second one is authentication and authorization mode for the scenario that the mobility anchor point and mobile node need to authenticate each other and the mobility anchor point also needs to know if the mobile node is authorized for using it.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1