首页 > 最新文献

International Workshop Emerging Technologies for Authorization and Authentication最新文献

英文 中文
Linking Contexts from Distinct Data Sources in Zero Trust Federation 零信任联合中不同数据源的链接上下文
Pub Date : 2022-09-22 DOI: 10.48550/arXiv.2209.11108
Masato Hirai, Daisuke Kotani, Y. Okabe
An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses information of users and devices, called context, for authentication and authorization. Zero Trust Federation (ZTF) has been proposed as a framework for extending an idea of identity federation to support ZTA. ZTF defines CAP as the entity that collects context and provides it to each organization (Relying Party; RP) that needs context for authorization based on ZTA. To improve the quality of authorization, CAPs need to collect context from various data sources. However, ZTF did not provide a method for collecting context from data sources other than RP. In this research, as a general model for collecting context in ZTF, we propose a method of linking identifiers between the data source and CAP. This method provides a way to collect context from some of such data sources in ZTF. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.
一种称为零信任体系结构(ZTA)的访问控制模型引起了人们的注意。ZTA使用用户和设备的信息(称为上下文)进行身份验证和授权。零信任联盟(Zero Trust Federation, ZTF)被提议作为扩展身份联盟思想以支持ZTA的框架。ZTF将CAP定义为收集上下文并将其提供给每个组织(依赖方;RP),需要基于ZTA的授权上下文。为了提高授权质量,cap需要从各种数据源收集上下文。但是,ZTF没有提供从RP以外的数据源收集上下文的方法。在本研究中,作为在ZTF中收集上下文的通用模型,我们提出了一种在数据源和CAP之间链接标识符的方法。该方法提供了一种从ZTF中某些此类数据源收集上下文的方法。然后,我们使用RADIUS和MDM作为数据源来实现我们的方法,并确认可以收集和使用它们的上下文。
{"title":"Linking Contexts from Distinct Data Sources in Zero Trust Federation","authors":"Masato Hirai, Daisuke Kotani, Y. Okabe","doi":"10.48550/arXiv.2209.11108","DOIUrl":"https://doi.org/10.48550/arXiv.2209.11108","url":null,"abstract":"An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses information of users and devices, called context, for authentication and authorization. Zero Trust Federation (ZTF) has been proposed as a framework for extending an idea of identity federation to support ZTA. ZTF defines CAP as the entity that collects context and provides it to each organization (Relying Party; RP) that needs context for authorization based on ZTA. To improve the quality of authorization, CAPs need to collect context from various data sources. However, ZTF did not provide a method for collecting context from data sources other than RP. In this research, as a general model for collecting context in ZTF, we propose a method of linking identifiers between the data source and CAP. This method provides a way to collect context from some of such data sources in ZTF. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication, Authorization, and Selective Disclosure for IoT data sharing using Verifiable Credentials and Zero-Knowledge Proofs 使用可验证凭证和零知识证明的物联网数据共享的身份验证,授权和选择性披露
Pub Date : 2022-09-01 DOI: 10.48550/arXiv.2209.00586
N. Fotiou, Iakovos Pittaras, Spiros Chadoulos, V. Siris, G.C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis
As IoT becomes omnipresent vast amounts of data are generated, which can be used for building innovative applications. However,interoperability issues and security concerns, prevent harvesting the full potentials of these data. In this paper we consider the use case of data generated by smart buildings. Buildings are becoming ever"smarter"by integrating IoT devices that improve comfort through sensing and automation. However, these devices and their data are usually siloed in specific applications or manufacturers, even though they can be valuable for various interested stakeholders who provide different types of"over the top"services, e.g., energy management. Most data sharing techniques follow an"all or nothing"approach, creating significant security and privacy threats, when even partially revealed, privacy-preserving, data subsets can fuel innovative applications. With these in mind we develop a platform that enables controlled, privacy-preserving sharing of data items. Our system innovates in two directions: Firstly, it provides a framework for allowing discovery and selective disclosure of IoT data without violating their integrity. Secondly, it provides a user-friendly, intuitive mechanisms allowing efficient, fine-grained access control over the shared data. Our solution leverages recent advances in the areas of Self-Sovereign Identities, Verifiable Credentials, and Zero-Knowledge Proofs, and it integrates them in a platform that combines the industry-standard authorization framework OAuth 2.0 and the Web of Things specifications.
随着物联网变得无处不在,产生了大量数据,这些数据可用于构建创新应用程序。然而,互操作性问题和安全性问题阻碍了这些数据的充分利用。在本文中,我们考虑了智能建筑产生的数据的用例。通过集成物联网设备,通过传感和自动化提高舒适度,建筑物正变得越来越“智能”。然而,这些设备及其数据通常被隔离在特定的应用程序或制造商中,尽管它们对于提供不同类型的“顶级”服务(例如,能源管理)的各种感兴趣的利益相关者可能很有价值。大多数数据共享技术都遵循“要么全有,要么全无”的方法,这造成了严重的安全和隐私威胁,即使是部分披露、保护隐私的数据子集也可以推动创新应用程序。考虑到这些,我们开发了一个平台,可以实现受控的、保护隐私的数据项共享。我们的系统在两个方向上进行了创新:首先,它提供了一个框架,允许在不违反其完整性的情况下发现和选择性披露物联网数据。其次,它提供了一种用户友好、直观的机制,允许对共享数据进行高效、细粒度的访问控制。我们的解决方案利用了自主身份、可验证凭证和零知识证明领域的最新进展,并将它们集成在一个平台中,该平台结合了行业标准授权框架OAuth 2.0和物联网规范。
{"title":"Authentication, Authorization, and Selective Disclosure for IoT data sharing using Verifiable Credentials and Zero-Knowledge Proofs","authors":"N. Fotiou, Iakovos Pittaras, Spiros Chadoulos, V. Siris, G.C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis","doi":"10.48550/arXiv.2209.00586","DOIUrl":"https://doi.org/10.48550/arXiv.2209.00586","url":null,"abstract":"As IoT becomes omnipresent vast amounts of data are generated, which can be used for building innovative applications. However,interoperability issues and security concerns, prevent harvesting the full potentials of these data. In this paper we consider the use case of data generated by smart buildings. Buildings are becoming ever\"smarter\"by integrating IoT devices that improve comfort through sensing and automation. However, these devices and their data are usually siloed in specific applications or manufacturers, even though they can be valuable for various interested stakeholders who provide different types of\"over the top\"services, e.g., energy management. Most data sharing techniques follow an\"all or nothing\"approach, creating significant security and privacy threats, when even partially revealed, privacy-preserving, data subsets can fuel innovative applications. With these in mind we develop a platform that enables controlled, privacy-preserving sharing of data items. Our system innovates in two directions: Firstly, it provides a framework for allowing discovery and selective disclosure of IoT data without violating their integrity. Secondly, it provides a user-friendly, intuitive mechanisms allowing efficient, fine-grained access control over the shared data. Our solution leverages recent advances in the areas of Self-Sovereign Identities, Verifiable Credentials, and Zero-Knowledge Proofs, and it integrates them in a platform that combines the industry-standard authorization framework OAuth 2.0 and the Web of Things specifications.","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124992029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Interface between Legacy and Modern Mobile Devices for Digital Identity 用于数字身份的传统和现代移动设备之间的接口
Pub Date : 2021-12-10 DOI: 10.1007/978-3-030-93747-8_5
V. Mavroudis, Chris Hicks, J. Crowcroft
{"title":"An Interface between Legacy and Modern Mobile Devices for Digital Identity","authors":"V. Mavroudis, Chris Hicks, J. Crowcroft","doi":"10.1007/978-3-030-93747-8_5","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_5","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"1201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127432681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions 面向未来的Web身份验证:带上你自己的FIDO2扩展
Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_2
Florentin Putz, Steffen Schön, M. Hollick
{"title":"Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions","authors":"Florentin Putz, Steffen Schön, M. Hollick","doi":"10.1007/978-3-030-93747-8_2","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_2","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133763858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Handling Meta Attribute Information in Usage Control Policies (Short Paper) 使用控制策略中元属性信息的处理(短文)
Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_10
T. Dimitrakos, Tezcan Dilshener, A. Kravtsov, Antonio La Marra, F. Martinelli, Athanasios Rizos, A. Rosetti
{"title":"Handling Meta Attribute Information in Usage Control Policies (Short Paper)","authors":"T. Dimitrakos, Tezcan Dilshener, A. Kravtsov, Antonio La Marra, F. Martinelli, Athanasios Rizos, A. Rosetti","doi":"10.1007/978-3-030-93747-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_10","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115886625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Ask App Not to Track": The Effect of Opt-In Tracking Authorization on Mobile Privacy “请求应用不要跟踪”:选择跟踪授权对移动隐私的影响
Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_11
Anzo DeGiulio, H. Lee, Eleanor Birrell
{"title":"\"Ask App Not to Track\": The Effect of Opt-In Tracking Authorization on Mobile Privacy","authors":"Anzo DeGiulio, H. Lee, Eleanor Birrell","doi":"10.1007/978-3-030-93747-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_11","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131320085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving Speaker Verification and Speech Recognition 保护隐私的说话人验证和语音识别
Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-25467-3_7
Wisam Abbasi
{"title":"Privacy-Preserving Speaker Verification and Speech Recognition","authors":"Wisam Abbasi","doi":"10.1007/978-3-031-25467-3_7","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_7","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132663360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heartbeat-Based Authentication on Smartwatches in Various Usage Contexts 智能手表在不同使用环境下基于心跳的身份验证
Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-93747-8_3
D. Progonov, Oleksandra Sokol
{"title":"Heartbeat-Based Authentication on Smartwatches in Various Usage Contexts","authors":"D. Progonov, Oleksandra Sokol","doi":"10.1007/978-3-030-93747-8_3","DOIUrl":"https://doi.org/10.1007/978-3-030-93747-8_3","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132064159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An E-Voting System Based on Tornado Cash 基于Tornado Cash的电子投票系统
Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-25467-3_8
Stefano Bistarelli, Bruno Lazo La Torre Montalvo, Ivan Mercanti, Francesco Santini
{"title":"An E-Voting System Based on Tornado Cash","authors":"Stefano Bistarelli, Bruno Lazo La Torre Montalvo, Ivan Mercanti, Francesco Santini","doi":"10.1007/978-3-031-25467-3_8","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_8","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting FIDO Extensions Against Man-in-the-Middle Attacks 保护FIDO扩展免受中间人攻击
Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-25467-3_5
Andre Büttner, Nils Gruschka
{"title":"Protecting FIDO Extensions Against Man-in-the-Middle Attacks","authors":"Andre Büttner, Nils Gruschka","doi":"10.1007/978-3-031-25467-3_5","DOIUrl":"https://doi.org/10.1007/978-3-031-25467-3_5","url":null,"abstract":"","PeriodicalId":390980,"journal":{"name":"International Workshop Emerging Technologies for Authorization and Authentication","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Workshop Emerging Technologies for Authorization and Authentication
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1