120,421 Hits in 4.1 sec

Policy and Trust in Open Multi-Operator Networks [chapter]

Pekka Nikander, Lasse Metso
2000 Telecommunication Network Intelligence  
Keywords: In the future telecommunications network, more and more services are based on open protocols and architectures.  ...  In such an environment, there is a clear need for controlling the access of users and other operators to the network services.  ...  or multi-operator networks.  ... 
doi:10.1007/978-0-387-35522-1_24 dblp:conf/smartnet/NikanderM00 fatcat:syavefh24bauvajnstmopfyivm

Open Cloud eXchange (OCX): Architecture and Functional Components

Yuri Demchenko, Jeroen van der Ham, Canh Ngo, Taras Matselyukh, Sonja Filiposka, Cees de Laat, Eduard Escalona
2013 2013 IEEE 5th International Conference on Cloud Computing Technology and Science  
In both cases there is a need for interconnecting the CSP infrastructure and local access network infrastructure, in particular, to solve the "last mile" problem in delivering cloud services to customer  ...  The paper also describes trusted/secured topology exchange protocol and dynamic trust establishment protocol as a part of the OCX services.  ...  OCX may operate under supervision of the community (representatives) which will act as a policy authority for security and operational practices; in this case OCX may provide a clearinghouse service for  ... 
doi:10.1109/cloudcom.2013.108 dblp:conf/cloudcom/DemchenkoHNMFLE13 fatcat:hk4ddlapx5dzxa3zmoy74fmi7q

Policies to Enable Serving Untrusted Services on Alternative (Non-3GPP) and Untrusted Access Networks in EPS

Rebecca Copeland, Noel Crespi
2011 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops  
These methods and policies should be better organized in an effort to manage a multi-access and open service environment, with heterogeneous access technologies and collaboration across business borders  ...  This paper examines the emerging methods of utilizing untrusted access and facilitating untrusted third party services on either trusted or non-trusted access networks via existing and extended EPS facilities  ...  Attaching to alternative trusted and untrusted access becomes easier in EPS, which is designed for multi-access.  ... 
doi:10.1109/compsacw.2011.19 dblp:conf/compsac/CopelandC11 fatcat:yul72sisbrcaxcnno5rkeb6zs4

Digital Rights Management Ecosystem: Open Issues and Challenges

Zhiyong Zhang
2011 International Journal of Digital Content Technology and its Applications  
usage control in digital home networks, multi-stakeholder trust and assessment in multimedia social networks, as well as security risk management for digital contents and rights redistribution led by  ...  policies and mechanisms.  ...  In multi-party trust establishment and strengthening, usage control and other security mechanisms also play an important role.  ... 
doi:10.4156/jdcta.vol5.issue11.37 fatcat:xgutfpjtifckvaei2ihnmrwzgi

Open Cloud eXchange (OCX): A Pivot for Intercloud Services Federation in Multi-provider Cloud Market Environment

Yuri Demchenko, Cosmin Dumitru, Ralph Koining, Cees de Laat, Taras Matselyukh, Sonja Filiposka, Migiel de Vos, Daniel Arbel, Damir Regvart, Tasos Karaliotas, Kurt Baumann
2015 2015 IEEE International Conference on Cloud Engineering  
This paper presents results of the ongoing development of the Open Cloud eXchange (OCX) that has been proposed in the framework of the GN3plus project.  ...  building dynamic trust federations; and the marketplace to enable publishing and discovery of cloud services.  ...  Intercloud federation and trust management research and development are partly supported by the Horizon2020 project CYCLONE.  ... 
doi:10.1109/ic2e.2015.84 dblp:conf/ic2e/DemchenkoDKLMFV15 fatcat:uysqh5spc5dcjljiw4r5mcg4we

Intelligent Zero Trust Architecture for 5G/6G Networks: Principles, Challenges, and the Role of Machine Learning in the context of O-RAN [article]

Keyvan Ramezanpour, Jithin Jagannath
2022 arXiv   pre-print
While network virtualization, software-defined networking (SDN), and service-based architectures (SBA) are key enablers of 5G networks, operating in an untrusted environment has also become a key feature  ...  We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components.  ...  Any subject operating in the trust zone, after appropriate authentication and authorization, is deemed trusted.  ... 
arXiv:2105.01478v2 fatcat:3cacrt5yhzejdl6znma2gn56cm

Communities of Trust in Tactical Coalition Networks

Anders Fongen, Mazda Salmanian
2014 2014 IEEE Military Communications Conference  
Central to this framework are the concepts of Communities of Trust and Policy Enforcement Points.  ...  In this paper, we build on the "guard" model and present a framework for trusted information exchange which accommodates a wider range of use cases, network topologies, and authorization models.  ...  If the PEP operates as a firewall with NAT, then the PEP will have to remember the IP/Port mapping for open TCP connections and consequently operate in a stateful manner.  ... 
doi:10.1109/milcom.2014.19 fatcat:kqy2nimh45egtho3xwo3vsgxmi

Re-thinking Grid Security Architecture

Yuri Demchenko, Cees de Laat, Oscar Koeroo, David Groep
2008 2008 IEEE Fourth International Conference on eScience  
Recent developments in open systems security, and revisiting basic security concepts in networking and computing including the OSI Security Architecture and the concepts used in the Trusted Computing Base  ...  control and policy enforcement scenarios in distributed resource management.  ...  Grid Data operational security policies. model can be applied to control and management data protection in an open environment.  ... 
doi:10.1109/escience.2008.53 dblp:conf/eScience/DemchenkoLKG08 fatcat:b6l3sodzzbbe5b2sgs2j4ofoja

The role of trust in innovation networks

John Skardon
2011 Procedia - Social and Behavioral Sciences  
This paper examines how trust, which has many possible institutional roles, may be critical to the successful operation of innovation networks and hub firms in particular.  ...  Innovation networks, a form of open innovation, can be implemented in several configurations or typologies.  ...  David Bodde, Professor and Senior Fellow, of Clemson University for his support and direction in this project, the US Department of Energy for their financial support, and Robert Leitner director of the  ... 
doi:10.1016/j.sbspro.2011.10.565 fatcat:jk23233nqvcipjb5sghnhxsqn4

A Logical Approach to Cloud Federation [article]

Qiang Cao, Yuanjun Yao, Jeff Chase
2017 arXiv   pre-print
The foundation of our approach is a trust logic in which participants issue authenticated statements about principals, objects, attributes, and relationships in a logic language, with reasoning based on  ...  declarative policy rules.  ...  Finally, we show how to authorize linked private networks (virtual private clouds or VPCs) in a multi-cloud, cross-tenant peering of VPC networks, and more complex cross-federation structures.  ... 
arXiv:1708.03389v1 fatcat:36k7oqne3vbc5nhzekzh4fntwm

A Benefits-centric Multi-participant Trust Architecture for DRM-Enabling Digital Contents Value Chain Ecosystem

Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang
2008 2008 International Seminar on Business and Information Management  
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (Digital Rights Management)-enabling digital contents industry.  ...  Then, a benefits-centric Multi-Participant Trust Architecture (abbr.  ...  Multi-Participant Trust Architecture and Hierarchical Analyses Based on the above proposed a general value chain and the anatomy of fundamental trust relationships, we proposed a Multi-Participant Trust  ... 
doi:10.1109/isbim.2008.161 fatcat:pr2dwwmyvfd3vcqgid7co5fxru

Trusted License Distribution System Based on IPSec VPN for Mobile DRM

Wang Jian, Zhang Zhiyong, Xiang Fei, Yu Weihua
2014 Open Electrical & Electronic Engineering Journal  
In this paper, a trusted license distribution system based on IPSec VPN and its correlative issues are presented.  ...  This system supports DRM clients to build IPSec VPN connection based on trusted authentication with DRM license server, and obtains license through secure tunnel.  ...  Firstly, for the opening of wireless network and the mobility of the terminals, mobile DRM is confronted with more serious threats than DRM in fixed-IP networks.  ... 
doi:10.2174/1874129001408010034 fatcat:5kgttnjjeff73djqo4jynitn6m

Digital Rights Management Ecosystem and its Usage Controls: A Survey

Zhiyong Zhang
2011 International Journal of Digital Content Technology and its Applications  
Therefore, security policies, multi-participant trust, and risk management are involved in the generic DRM ecosystem that supports two representative applications: content acquisition/transaction scenarios  ...  And also, a holistic and comprehensive investigation of usage control models, policies, and mechanism were made in detail.  ...  As an open issue in DRM and the digital world, the examination of multi-party trust between stakeholders should includes the following aspects: (a) In a DRM ecosystem, multi-party mutual trust is necessary  ... 
doi:10.4156/jdcta.vol5.issue3.26 fatcat:oeqighhzebf3tcc4uvnhxvwaoy

Replicated & Distributed Storage Technologies : "Impact on Social Science Data Archive Policies"

Jonathon Crabtree
2020 Zenodo  
The Data-PASS partnership engages in collaboration at three levels: coordinated operations, development of best practices, and creation and use of open-source shared infrastructure.  ...  The key when implementing these preservation environments will be the modification of existing archive policies and procedures to reflect new dependence on collaboration.  ...  : protocol version; storage available - Human readable terms of use: Documentation of hardware, software and operating personnel in support of TRAC criteria • Archival unit level - Identification:  ... 
doi:10.5281/zenodo.3781875 fatcat:qi47vf4kifhitkwsmdtelzjvqa

Intercloud Architecture Framework for Heterogeneous Cloud Based Infrastructure Services Provisioning On-Demand

Y. Demchenko, C. Ngo, C. de Laat, J. Rodriguez, L. M. Contreras, J. A. Garcia-Espin, S. Figuerola, G. Landi, N. Ciulli
2013 2013 27th International Conference on Advanced Information Networking and Applications Workshops  
Framework, and Intercloud Operations Framework.  ...  The paper describes an implementation of the Intercloud Control and Management Plane in the GEYSERS project to allow optimal provisioning of the combined Network+IT resources in the inter-cloud environment  ...  The two follow-on papers are devoted to the policy and security context management in the provisioned on-demand multi-domain and multi-provider cloud infrastructure [25] and propose the Dynamic Infrastructure  ... 
doi:10.1109/waina.2013.237 dblp:conf/aina/DemchenkoNLEFRMLC13 fatcat:ruea4jirb5gndotjp64jhmrt2y
« Previous Showing results 1 — 15 out of 120,421 results