2017 12th International Symposium on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC) 2017
DOI: 10.1109/recosoc.2017.8016157
|View full text |Cite
|
Sign up to set email alerts
|

Federated system-to-service authentication and authorization combining PUFs and tokens

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Some natural security requirements are mentioned, such as the CIA triad and non-repudiation. Beltrán et al [24] also target low-power devices, but they explore a setting in which these resource-constrained systems interact with Cloud services. In this scenario, they identify the need for identification, authentication, authorization, and accounting mechanisms.…”
Section: Access Controlmentioning
confidence: 99%
“…Some natural security requirements are mentioned, such as the CIA triad and non-repudiation. Beltrán et al [24] also target low-power devices, but they explore a setting in which these resource-constrained systems interact with Cloud services. In this scenario, they identify the need for identification, authentication, authorization, and accounting mechanisms.…”
Section: Access Controlmentioning
confidence: 99%
“…Using federated schemes allow users to avoid managing as many user names and passwords as services they want to interact with. Instead, they ask for a token at some kind of identity provider or verifier and all services participating in the federation trust these tokens to solve authentication and/ or authorization [48]. (v) OpenID Connect is the OAuth 2.0-based replacement for OpenID 2.0 (OpenID) and one of the most important single sign-on (SSO) protocols used for delegated authentication.…”
Section: Knowledge Domainmentioning
confidence: 99%