On interdomain security: trust establishment in loosely coupled federated environments
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
München
Verl. Dr. Hut
2008
|
Ausgabe: | 1. Aufl. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XI, IV, 226 S. graph. Darst. 24 cm, 486 gr. |
ISBN: | 9783899638714 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035278997 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 090129s2008 d||| m||| 00||| eng d | ||
016 | 7 | |a 992163153 |2 DE-101 | |
020 | |a 9783899638714 |c kart. : EUR 84.00 |9 978-3-89963-871-4 | ||
024 | 3 | |a 9783899638714 | |
035 | |a (OCoLC)643990799 | ||
035 | |a (DE-599)DNB992163153 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-91 | ||
082 | 0 | |a 629.276 |2 22/ger | |
084 | |a 620 |2 sdnb | ||
100 | 1 | |a Weyl, Benjamin |e Verfasser |0 (DE-588)137177070 |4 aut | |
245 | 1 | 0 | |a On interdomain security |b trust establishment in loosely coupled federated environments |c by Benjamin Weyl |
250 | |a 1. Aufl. | ||
264 | 1 | |a München |b Verl. Dr. Hut |c 2008 | |
300 | |a XI, IV, 226 S. |b graph. Darst. |c 24 cm, 486 gr. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |a Zugl.: Darmstadt, Techn. Univ., Diss., 2007 | ||
650 | 0 | 7 | |a VANET |0 (DE-588)7524983-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a VANET |0 (DE-588)7524983-2 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017084239&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017084239 |
Datensatz im Suchindex
_version_ | 1804138570425827328 |
---|---|
adam_text | TECHNICAL UNIVERSITY OF DARMSTADT INSTITUTE FOR COMPUTER SCIENCE
RESEARCH GROUP IT-SECURITY PH. D. THESIS ON INTERDOMAIN SECURITY: TRUST
ESTABLISHMENT IN LOOSELY COUPLED FEDERATED ENVIRONMENTS BY BENJAMIN WEYL
SUPERVISOR: PROF. DR. CLAUDIA ECKERT (TU DARMSTADT) PROF. DR. UWE
BAUMGARTEN (TU MIINCHEN) IN CO-OPERATION WITH BMW GROUP RESEARCH AND
TECHNOLOGY 2007 CONTENTS 1 INTRODUCTION 1 1.1 PROBLEM SETTING:
LOCATION-BASED SERVICES FOR AUTOMOTIVE TELEMATICS 1 1.2 PROBLEM
STATEMENT AND CHALLENGES 2 1.3 THESIS OBJECTIVES 4 1.4 SOLUTION APPROACH
4 1.5 THESIS OUTLINE 5 1.6 CONTRIBUTIONS 7 2 RELATED WORK 9 2.1
INTRODUCTION 9 2.2 FEDERATED IDENTITY MANAGEMENT 9 2.2.1 INTRODUCTION 9
2.2.2 IDENTITY FEDERATION STANDARDS AND FRAMEWORKS 10 2.3
REPUTATION-BASED TRUST MANAGEMENT 14 2.3.1 NOTION OF TRUST 15 2.3.2
TRUST MODELS 16 2.3.3 REPUTATION-BASED TRUST IN P2P SYSTEMS 18 2.3.4
REPUTATION-BASED TRUST IN THE CONTEXT OF MANETS 21 2.3.5
REPUTATION-BASED TRUST IN THE CONTEXT OF IDENTITY-BASED SYSTEMS .... 22
2.4 SUMMARY 24 3 TOWARDS NEW FEDERATION CONCEPTS FOR LOOSELY COUPLED
SYSTEMS 25 3.1 INTRODUCTION 1 25 3.1.1 NOTION OF FEDERATION FOR
INTERDOMAIN SECURITY 25 3.1.2 EVOLUTION OF MOBILE NETWORKS * 27 3.1.3
FEDERATION FOR MOBILE SERVICE SCENARIOS 28 3.1.4 LOCATION-BASED
BROADCAST SERVICES 29 3.1.5 EU FP 1ST DAIDALOS 30 3.2 STATIC FEDERATION
FOR MOBILE SERVICES 30 3.2.1 SECURITY REQUIREMENTS FOR MOBILE
INFRASTRUCTURES 30 CONTENTS 3.2.2 EXEMPLARY APPLICATION DOMAIN:
FEDERATED TELEMATICS SERVICES 34 3.2.3 STATIC FEDERATION APPROACH 35 3.3
TOWARDS DYNAMIC FEDERATION CONCEPTS 40 3.4 SUMMARY 42 4 CONCEPT FOR
AD-HOC TRUST-FEDERATION - FEDUST 43 4.1 DISTINCTION BETWEEN STATIC AND
AD-HOC FEDERATION 43 4.2 ARCHITECTURE 43 4.3 DESIGN CONCEPTS 44 4.3.1
TRUST MEDIATION : 45 4.3.2 DELEGATION OF TRUST REASONING 46 4.3.3 POLICY
DRIVEN TRUST ESTABLISHMENT AND TRUST LEVELS 46 4.3.4 FEDERATED TRUST
INFORMATION COLLECTION 47 4.3.5 FEDUST AUTHENTICATION CONCEPT 48 4.3.6
TRUST POLICY ESTABLISHMENT 49 4.3.7 PRIVACY-ENABLED TRUST CONVEYANCE 49
4.3.8 AGGREGATED VIEW ON DESIGN PRINCIPLES 50 4.4 FEDUST PROTOCOL 50
4.4.1 ASSUMPTIONS 51 4.4.2 PROTOCOL PHASES 52 4.4.3 TRUST INFORMATION
COLLECTION 52 4.4.4 TRUST EVALUATION AND REASONING 55 4.4.5 TRUST
ESTABLISHMENT 55 4.4.6 TRUST ENFORCEMENT 55 4.4.7 TRANSITION TO
EXPLORATORY STAGE 55 4.5 SUMMARY 56 5 SPECIFICATION AND SECURITY
ANALYSIS OF FEDUST 57 5.1 CASE STUDY: LOCATION-BASED TRAFFIC
ANNOUNCEMENT 57 5.2 SECURITY CONSIDERATIONS 58 5.2.1 METHODOLOGY 58
5.2.2 PROTECTABLE ASSETS 58 5.2.3 NOTION OF ATTACK 59 5.2.4 ATTACKS ON
FEDUST 60 5.2.5 SECURITY REQUIREMENTS 64 5.3 ASSUMPTIONS AND NOTATION 66
5.3.1 NOTES ON THE PROTOCOL DESCRIPTION 66 5.3.2 NOTATION 67 5.4 THE
INTRODUCTORY STAGE 67 5.4.1 SERVICE BEACON 68 5.4.2 TIC GENERATION 68
5.4.3 SERVICE REQUEST 70 5.4.4 REQUEST FOR AGREED TRUST POLICY ATP 70
5.4.5 VERIFICATION OF TICS AND CERTIFICATES 71 CONTENTS 5.4.6 FEDUST
AUTHORIZATION REQUEST AND TRUST OPINION REQUEST 71 5.4.7 TRUST
COLLECTION IN TMPB REPOSITORY 72 5.4.8 FEDUST AUTHORIZATION RESPONSE AND
TRUST OPINION RESPONSE 72 5.4.9 TRUST INFORMATION ASSERTION GENERATION
ON TMPA SIDE 73 5.4.10 TRUST INFORMATION ASSERTION GENERATION ON TMPB
SIDE 73 5.4.11 TRUST POLICY GENERATION 74 5.4.12 AGREED TRUST POLICY
GENERATION 74 5.4.13 TRUST SESSION ESTABLISHMENT 75 5.4.14 DISCUSSION ON
THE TRUST IDENTIFICATION CREDENTIAL 76 5.5 THE EXPLORATORY STAGE 79
5.5.1 THE TMP TRUST REPOSITORY 79 5.5.2 MESSAGE TRANSFER 81 5.6
INTERESTING ATTACKS ON FEDUST 83 5.6.1 COLLABORATIVE ATTACK 83 5.6.2
MALICIOUS IMPACT ON TRUST LEVELS 84 5.6.3 PREVENT FROM SENDING TRUST
INFORMATION 85 5.7 FEDUST POLICIES 85 5.7.1 MEASURES APPLIED IN FEDUST
POLICIES 86 5.7.2 POLICIES 87 5.8 SUMMARY 91 REPUTATION-BASED TRUST
MODEL 95 6.1 DEFINITION OF TRUST 95 6.2 TRUST DECISION PROCESS 96 6.3
DEFINING TRUST COMPONENTS 97 6.4 REPUTATION FOR INFERRING A TRUST
DECISION 99 6.4.1 HISTORY AND NON-HISTORY-BASED TRUST ESTABLISHMENT 99
6.4.2 APPLICABLE TRUST INFORMATION AND TRUST PHASES 99 6.4.3 REPUTATION
101 6.4.4 RECOMMENDATION 102 6.5 FORMAL TRUST MODEL 102 6.5.1 DIRECT
EXPERIENCE 103 6.5.2 DISPOSITIONAL TRUST 104 6.5.3 REPUTATION LEVEL 104
6.5.4 FROM REPUTATION TO TRUST: TRUST LEVEL 105 6.5.5 GENERATING A TRUST
DECISION 106 6.6 APPLICATION OF TRUST MODEL ON FEDUST * 107 6.7 TRUST
VALIDITY 110 6.7.1 INTRODUCTION 110 6.7.2 CALCULATING VALIDITY 110 6.8
SUMMARY ILL VERIFICATION, REALIZATION AND RESULTS 115 7.1 PROTOCOL
ANALYSIS AND VERIFICATION 115 M CONTENTS 7.1.1 INTRODUCTION 115 7.1.2
FEDUST MODELLING IN SHVT 116 7.1.3 VERIFICATION AND ANALYSIS 119 7.1.4
ATTACKS ON SHVT FEDUST MODEL 125 7.2 PROTOTYPE 132 7.2.1 MODELLING AND
SIMULATION IN UML 132 7.2.2 FEDUST IMPLEMENTATION 133 7.2.3 INTEGRATION
IN CAR2X SIMULATION ENVIRONMENT 135 7.3 SIMULATION 135 7.3.1 EXECUTION
SPEED 136 7.3.2 SIMULATION OF TRUST DEVELOPMENT PROCESS 138 7.3.3 IMPACT
OF PARAMETERS 152 7.4 SUMMARY 159 8 CONCLUSIONS AND FUTURE WORK 161 8.1
SUMMARY 161 8.2 DISCUSSION 163 8.3 CONCLUSION 165 8.4 MAIN CONTRIBUTIONS
166 8.5 FURTHER WORK 167 BIBLIOGRAPHY 169 A UML OVERVIEW OF FEDUST
ARCHITECTURE 181 B UML OVERVIEW OF FEDUST PROTOTYPE 193 C FEDUST
SIMULATION CONFIGURATION 203 D SIMULATION CONFIGURATION FILE 205 E
EXAMPLE TRUST VALIDITY FUNCTIONS 209 GLOSSARY 211 LIST OF ABBREVIATIONS
215 LIST OF FIGURES ; 217 LIST OF TABLES 221 RESUME 223 INDEX 225
|
any_adam_object | 1 |
author | Weyl, Benjamin |
author_GND | (DE-588)137177070 |
author_facet | Weyl, Benjamin |
author_role | aut |
author_sort | Weyl, Benjamin |
author_variant | b w bw |
building | Verbundindex |
bvnumber | BV035278997 |
ctrlnum | (OCoLC)643990799 (DE-599)DNB992163153 |
dewey-full | 629.276 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 629 - Other branches of engineering |
dewey-raw | 629.276 |
dewey-search | 629.276 |
dewey-sort | 3629.276 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Maschinenbau / Maschinenwesen Verkehr / Transport |
edition | 1. Aufl. |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01591nam a2200409 c 4500</leader><controlfield tag="001">BV035278997</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090129s2008 d||| m||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">992163153</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783899638714</subfield><subfield code="c">kart. : EUR 84.00</subfield><subfield code="9">978-3-89963-871-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783899638714</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)643990799</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB992163153</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">629.276</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">620</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weyl, Benjamin</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)137177070</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">On interdomain security</subfield><subfield code="b">trust establishment in loosely coupled federated environments</subfield><subfield code="c">by Benjamin Weyl</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. Aufl.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">München</subfield><subfield code="b">Verl. Dr. Hut</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, IV, 226 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm, 486 gr.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Darmstadt, Techn. Univ., Diss., 2007</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">VANET</subfield><subfield code="0">(DE-588)7524983-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">VANET</subfield><subfield code="0">(DE-588)7524983-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017084239&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017084239</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV035278997 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:30:17Z |
institution | BVB |
isbn | 9783899638714 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017084239 |
oclc_num | 643990799 |
open_access_boolean | |
owner | DE-12 DE-91 DE-BY-TUM |
owner_facet | DE-12 DE-91 DE-BY-TUM |
physical | XI, IV, 226 S. graph. Darst. 24 cm, 486 gr. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Verl. Dr. Hut |
record_format | marc |
spelling | Weyl, Benjamin Verfasser (DE-588)137177070 aut On interdomain security trust establishment in loosely coupled federated environments by Benjamin Weyl 1. Aufl. München Verl. Dr. Hut 2008 XI, IV, 226 S. graph. Darst. 24 cm, 486 gr. txt rdacontent n rdamedia nc rdacarrier Zugl.: Darmstadt, Techn. Univ., Diss., 2007 VANET (DE-588)7524983-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content VANET (DE-588)7524983-2 s Datenschutz (DE-588)4011134-9 s DE-604 HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017084239&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Weyl, Benjamin On interdomain security trust establishment in loosely coupled federated environments VANET (DE-588)7524983-2 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)7524983-2 (DE-588)4011134-9 (DE-588)4113937-9 |
title | On interdomain security trust establishment in loosely coupled federated environments |
title_auth | On interdomain security trust establishment in loosely coupled federated environments |
title_exact_search | On interdomain security trust establishment in loosely coupled federated environments |
title_full | On interdomain security trust establishment in loosely coupled federated environments by Benjamin Weyl |
title_fullStr | On interdomain security trust establishment in loosely coupled federated environments by Benjamin Weyl |
title_full_unstemmed | On interdomain security trust establishment in loosely coupled federated environments by Benjamin Weyl |
title_short | On interdomain security |
title_sort | on interdomain security trust establishment in loosely coupled federated environments |
title_sub | trust establishment in loosely coupled federated environments |
topic | VANET (DE-588)7524983-2 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | VANET Datenschutz Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017084239&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT weylbenjamin oninterdomainsecuritytrustestablishmentinlooselycoupledfederatedenvironments |