A cyber-resilient architecture for critical security services
Authentication and authorization are two of the most important services for any IT
infrastructure. Taking into account the current state of affairs of cyber warfare, the security …
infrastructure. Taking into account the current state of affairs of cyber warfare, the security …
Towards secure and dependable authentication and authorization infrastructures
We propose a resilience architecture for improving the security and dependability of
authentication and authorization infrastructures, in particular the ones based on RADIUS …
authentication and authorization infrastructures, in particular the ones based on RADIUS …
[PDF][PDF] System design artifacts for resilient identification and authentication infrastructures
The correct and continuous operation of identity providers and access control services is
critical for new generations of networks and online systems, such as virtualized networks …
critical for new generations of networks and online systems, such as virtualized networks …
[PDF][PDF] Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities.
In our previous work we designed and evaluated the feasibility of highly secure and
dependable identity providers (IdPs) for the increasing requirements of future IT …
dependable identity providers (IdPs) for the increasing requirements of future IT …
Freelib: peer-to-peer-based digital libraries
In this paper, we propose a P2P digital library that takes advantage of P2P networks and
digital libraries. The key problem with P2P network searches is the low recall value, time to …
digital libraries. The key problem with P2P network searches is the low recall value, time to …
An architecture to resilient and highly available identity providers based on OpenID standard
HA Cunha - 2014 - tede.ufam.edu.br
Secure authentication services and systems typically are based on two main approaches:
the first one seeks to defend itself of all kind of attack. Actually, the major current services …
the first one seeks to defend itself of all kind of attack. Actually, the major current services …
Um serviço de diretórios tolerante a falhas e intrusões
R Mendonça Neto - 2016 - tede.ufam.edu.br
Serviços de diretório são frequentemente usados para armazenar informações sensíveis
(eg, dados e credenciais de usuários) nos mais variados sistemas críticos, tais como …
(eg, dados e credenciais de usuários) nos mais variados sistemas críticos, tais como …