2009 IEEE Symposium on Computers and Communications 2009
DOI: 10.1109/iscc.2009.5202234
|View full text |Cite
|
Sign up to set email alerts
|

Integrating user Identity Management systems with the Host Identity Protocol

Abstract: Abstract-Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning. Unrelated approaches on the network layer introduce identity concepts to solve mobility problems and support multihoming. This paper describes a novel approach to the integration of IdM on the application layer with identity concepts introduced by the Host Identity Protocol (HIP). We propose an integrated architecture combining the ad… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Barish et al [13], describes a somewhat similar setup than the one proposed here. In their approach, a global address manager is used to keep track of tags.…”
Section: Related Workmentioning
confidence: 62%
See 1 more Smart Citation
“…Barish et al [13], describes a somewhat similar setup than the one proposed here. In their approach, a global address manager is used to keep track of tags.…”
Section: Related Workmentioning
confidence: 62%
“…If the tag is not present at the location the request is redirected to the global address server that returns the tag's present address or just redirects the request to the correct address. In contrast to the proposed solution by Barish et al [13], the approach described here does not include extra nodes in the network to construct network addresses but adds functionality to the RFID readers residing at the network edge.…”
Section: Related Workmentioning
confidence: 99%
“…Some studies propose to provide the tags themselves with the IPv6 protocol stack, making them able to use IPv6 communication over the Internet whenever close to a reader [5]. However, it is proved that this proposition represent a great challenge because several changes are required to the design of existing tags more specifically providing tags with an alimentation source.…”
Section: Related Workmentioning
confidence: 99%
“…However, it is proved that this proposition represent a great challenge because several changes are required to the design of existing tags more specifically providing tags with an alimentation source. These changes make tags too expensive for integration into the Internet of Things since the price of the tags could easily exceed the value of the "things" themselves [5].…”
Section: Related Workmentioning
confidence: 99%
“…Presently there is no better authorization of 'global trust' than preinstalled CA certificates in certificate databases of www browsers and email clients. However, also HI certification by an intra-domain trusted CA can create a trust relationship between two HIP network hosts from different network domains, when both domains belong to the same Identity Management Federation based on a framework like Microsoft CardSpace, OpenID, Liberty Alliance (LA), or Shibboleth (Barisch & Matos, 2009).…”
Section: Pki and Hipmentioning
confidence: 99%