Filters








452,731 Hits in 3.8 sec

Authentication, Authorization, and Accounting [chapter]

Alessandro Paolini, Diego Scardaci, Nicolas Liampotis, Vincenzo Spinoso, Baptiste Grenier, Yin Chen
2020 Lecture Notes in Computer Science  
It is widely acknowledged that Authentication, Authorization and Accounting (AAA) play a crucial role in providing a secure distributed digital environment.  ...  Environmental research infrastructures and data providers are often required to authenticate researchers and manage their access rights to scientific data, sensor instruments or online computing resources  ...  This work was supported by the European Union's Horizon 2020 research and innovation programme via the ENVRIplus project under grant agreement No 654182.  ... 
doi:10.1007/978-3-030-52829-4_14 fatcat:pub6kknqpzfj5mklesq2i2upam

Authentication, Authorization, Admission, and Accounting for QoS Applications [chapter]

Carlos Rabadão, Edmundo Monteiro
2004 Lecture Notes in Computer Science  
To overcome these limitations, this paper proposes an architecture for Authentication, Authorization, Admission control and Accounting (AAAA) of QoS client applications with dynamic identification of sessions  ...  and flows.  ...  Acknowledgements This work was partially financed by the PRODEP program supported by the Portuguese Government and the European Union FSE Programme. References [1] S.  ... 
doi:10.1007/978-3-540-30197-4_44 fatcat:j3qaiwxk2zditigh56bh7exati

The 3 "A"s: Authentication, Authorization, Accounting [chapter]

2006 AAA and Network Security for Mobile Access  
teams to start decoupling the authentication and authorization procedures through using a variety of tools such as separating authentication and authorization credentials.  ...  Generic AAA Architecture We explained the three-party authentication model deploying a AAA server, and throughout this chapter attempted to show why authentication, authorization, and accounting procedures  ... 
doi:10.1002/0470017465.ch1 fatcat:kgk643gs4najhlswvqke2ijkra

3AS: Authentication, Authorization, and Accountability for SDN-based Smart Grids

Arthur A. Z. Soares, Yona Lopes, Diego Passos, Natalia C. Fernandes, Debora C. Muchaluat-Saade
2021 IEEE Access  
Her research interests include computer networks, wireless networks, smart grids, multimedia systems, and digital healthcare.  ...  Rio de Janeiro State's Research Support Foundation (FAPERJ), the Coordination for the Improvement of Higher Education Personnel (CAPES), and other funding agencies.  ...  AUTHENTICATION, AUTHORIZATION, AND ACCOUNTABILITY (AAA) While the IEC 62351 standard partially cites accountability, its focus is only on AA.  ... 
doi:10.1109/access.2021.3090346 fatcat:673tdcliunb7fdexhxywf6nz5q

NeIC Dellingr Project Phase 2 Deliverable 4 "User Authentication, Authorization and Accounting"

Mathias Brännvall, Juha Fagerholm, Björn Lindi, Ilja Livenson, Petri Nikunen, Ahti Saar, Anders Sjöström, Jens Svalgaard-Kohrt, Hjörleifur Sveinbjörnsson, John White
2020 Zenodo  
Dellingr Phase 2 deliverable DO4 outlining user authentication, authorization and accounting issues for the Dellingr project and for resource sharing across borders generally.  ...  AAI for other similar projects are outlined and legal issues given. Recommendations for such projects are given.  ...  Sweden for authentication and authorization of end users.  ... 
doi:10.5281/zenodo.3973169 fatcat:x5rgmjmkkzgspg35nwe4zxnqiq

Shibboleth based Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks

Eryk Jerzy Schiller, Alexey Monakhov, Peter Kropf
2011
We present the basic architectural elements of the Captive Portal integrating Shibboleth based Authentication, Authorization, Accounting and Auditing into Wireless Mesh Networks.  ...  Abstract-We present the basic architectural elements of the Captive Portal integrating Shibboleth based Authentication, Authorization, Accounting and Auditing into Wireless Mesh Networks.  ...  by funds from the Swiss State Secretariat for Education and Research.  ... 
doi:10.5167/uzh-174650 fatcat:sesxvf2gvnc3rofmymqrvgs3tu

AAA and Mobile Networks: Security Aspects and Architectural Efficiency

Nicolas Sklavos, Spyros Denazis, Odysseas Koufopavlou
2007 Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications  
The name of this standard (AAA) defines Authentication, Authorization and Accounting services for the network subscribers.  ...  Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponential function.  ...  AAA is a security standard that supports authentication, authorization and accounting services. This work deals with the supported security services of AAA, in technical detail.  ... 
doi:10.4108/icst.mobimedia2007.1894 dblp:conf/mobimedia/SklavosDK07 fatcat:y7uxh3dzdrc6tfxeket2n2ugty

Research and Implementation of Single Sign-On Mechanism for ASP Pattern [chapter]

Bo Li, Sheng Ge, Tian-yu Wo, Dian-fu Ma
2004 Lecture Notes in Computer Science  
authentication and authorization results.  ...  This paper proposes a method, which stores information in a uniform format, accesses it in a standard interface and exploits account federation, authentication proxy, and authorization proxy to transfer  ...  Application always has its own authentication and authorization mechanism Heterogeneity of which result in problems [1] . !users must remember independent accounts and login repeatedly.  ... 
doi:10.1007/978-3-540-30208-7_27 fatcat:ltgr7tvfkve5vfq53xfqv324ga

Three Factor Authentication Novel Framework through Improve System Privacy and Data Security

Er. Vishal Chauhan, Dr. Chandresh Parekh, Prof. Vivek Joshi
2021 International Journal of Scientific Research in Science Engineering and Technology  
Authentication, Authorization, security and confidential information are number of foremost topics part in the Digital cyber - security Area.  ...  Username and password base are common factor authentication methods.  ...  level and Account level factor authentication with authorization that is novel approach suggested and proposed by this model framework.  ... 
doi:10.32628/ijsrset218324 fatcat:whfjpqeuyzchfnabgbawbhnv5y

Centralized Authentication Services (Radius, Tacacs, Diameter) [chapter]

Bill Stackpole
2007 Information Security Management Handbook, Sixth Edition  
INTRODUCTION RADIUS, TACACS, and DIAMETER are classified as authentication, authorization, and accounting (AAA) servers.  ...  RADIUS can proxy both authentication and accounting requests.  ...  DIAMETER is a highly extensible AAA framework capable of supporting any number of authentication, authorization, or accounting schemes and connection types.  ... 
doi:10.1201/9781439833032.ch70 fatcat:afl4pwjfwfcdze4kg6jqfepr5q

Authentication, Authorisation and Accounting strategy

Zwölf, Rixon
2015 Zenodo  
Authentication, Authorisation and Accounting strategy for the VAMDC infrastructure.  ...  The accounting should operate on all VAMDC services that deal in data. The majority of these services apply no authorization policy, and therefore do not enable authentication.  ...  The accounting refers to the tracking of the data accesses and/or resources executed by authorized users at a given time.  ... 
doi:10.5281/zenodo.3936606 fatcat:vqfyyp27zvckdevlypybpxpa3y

Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication [chapter]

HyunGon Kim, ByeongKyun Oh
2005 Lecture Notes in Computer Science  
Thus, the server can perform creditcontrol authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units.  ...  In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user's account  ...  , authorization, and accounting server (AAAF) in the Mobile Node(MN)'s foreign network and a home AAA server (AAAH) in the MN's home network [6] .  ... 
doi:10.1007/11552055_25 fatcat:diitbxupnvgqza52ijodlouqpq

Authentication and Authorization

Michael Epping, Mark Morowczynski
2021 IDPro Body of Knowledge  
This article describes the fundamentals of authentication and authorization, two core components of Identity and Access Management.  ...  It also delves into federation and Identity Providers, common tools for performing authentication and authorization in an organization.  ...  Author Bios Michael Epping is a Program Manager in the Azure AD Engineering team at Microsoft.  ... 
doi:10.55621/idpro.78 fatcat:clmrsm55hnddrez7dtmgorcu2i

AAA: a survey and a policy-based architecture and framework

C. Rensing, M. Karsten, B. Stiller
2002 IEEE Network  
Distributed AAA servers offer user authentication, authorization, and accounting services.  ...  This enables a Diameter server to authenticate, authorize, and collect accounting information for services requested by a mobile node.  ... 
doi:10.1109/mnet.2002.1081762 fatcat:ufehyyfmmnau7m62nrx4s5pyyu

Adding Third-Party Authentication to Open edX

John Cox, Pavel Simakov
2015 Proceedings of the Second (2015) ACM Conference on Learning @ Scale - L@S '15  
We outline the features and advantages of the system, describe how it can be extended and customized, and highlight reusable design principles that can be applied to other authentication implementations  ...  In this document, we describe the third-party authentication system we added to Open edX.  ...  Finally, we would like to thank Matías Aguirre and the other authors of python-social-auth.  ... 
doi:10.1145/2724660.2728675 dblp:conf/lats/CoxS15 fatcat:zzg3pomadnh6no23npjx57u25e
« Previous Showing results 1 — 15 out of 452,731 results