Authorization Profile

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1857 Experts worldwide ranked by ideXlab platform

Carsten Bormann - One of the best experts on this subject based on the ideXlab platform.

  • c3dc constrained client cross domain capable Authorization Profile for authentication and Authorization for constrained environments ace
    2018
    Co-Authors: Stefanie Gerdes, Olaf Bergmann, Carsten Bormann
    Abstract:

    Resource-constrained nodes come in various sizes and shapes and often have constraints on code size, state memory, processing capabilities, user interface, power and communication bandwidth (RFC 7228). This document specifies a Profile that describes how two autonomous resource-constrained devices, a client and a server, obtain the required keying material and Authorization information to securely communicate with each other. Each of the devices is coupled with a less-constrained device, the Authorization manager, that helps with difficult authentication and Authorization tasks. The constrained devices do not need to register with Authorization managers from other security domains. The Profile specifically targets constrained clients and servers. It is designed to consider the security objectives of the owners on the server and the client side.

Stefanie Gerdes - One of the best experts on this subject based on the ideXlab platform.

  • c3dc constrained client cross domain capable Authorization Profile for authentication and Authorization for constrained environments ace
    2018
    Co-Authors: Stefanie Gerdes, Olaf Bergmann, Carsten Bormann
    Abstract:

    Resource-constrained nodes come in various sizes and shapes and often have constraints on code size, state memory, processing capabilities, user interface, power and communication bandwidth (RFC 7228). This document specifies a Profile that describes how two autonomous resource-constrained devices, a client and a server, obtain the required keying material and Authorization information to securely communicate with each other. Each of the devices is coupled with a less-constrained device, the Authorization manager, that helps with difficult authentication and Authorization tasks. The constrained devices do not need to register with Authorization managers from other security domains. The Profile specifically targets constrained clients and servers. It is designed to consider the security objectives of the owners on the server and the client side.

Olaf Bergmann - One of the best experts on this subject based on the ideXlab platform.

  • c3dc constrained client cross domain capable Authorization Profile for authentication and Authorization for constrained environments ace
    2018
    Co-Authors: Stefanie Gerdes, Olaf Bergmann, Carsten Bormann
    Abstract:

    Resource-constrained nodes come in various sizes and shapes and often have constraints on code size, state memory, processing capabilities, user interface, power and communication bandwidth (RFC 7228). This document specifies a Profile that describes how two autonomous resource-constrained devices, a client and a server, obtain the required keying material and Authorization information to securely communicate with each other. Each of the devices is coupled with a less-constrained device, the Authorization manager, that helps with difficult authentication and Authorization tasks. The constrained devices do not need to register with Authorization managers from other security domains. The Profile specifically targets constrained clients and servers. It is designed to consider the security objectives of the owners on the server and the client side.