Now showing items 1-14 of 14

    • Communities of Trust in Tactical Coalition Networks 

      Fongen, Anders; Salmanian, Mazda (2014)
      The need for information exchange between security domains has traditionally been approached through the use of guards and security labels. Although these technologies are thoroughly researched and exist in mature ...
    • Cooperative Caching in Space Information Networks 

      Fongen, Anders; Landmark, Lars (2022-05-22)
      Members of a Low Earth Orbit (LEO) satellite group need to coordinate their activities in order to improve the quality and timeliness of the services provided to terrestrial clients. As a report from a work in progress, ...
    • Distributed certificate validation in MANET 

      Fongen, Anders (2009)
      The need for certificate management in mobile ad hoc networks (MANET) is the background for this report. A prototype implementation of a distributed certificate validation service is presented and evaluated. The proposed ...
    • Federated Identity Management in a Tactical Multi-Domain Network 

      Fongen, Anders (2011)
      Identity Management maintains information regarding actors of an Information System, like users, equipment and services. One important service is to disseminate and validate credentials for the purpose of authentication ...
    • High assurance information exchange based on publish-subscribe and ABAC methods 

      Fongen, Anders; Mancini, Federico (2014)
      The presented effort employs a combination of publish-subscribe distribution and ABAC (Attribute Based Access Control) methods to control the information exchange between security domains. It follows strictly the "separation ...
    • The Integration of Trusted Platform Modules into a Tactical Identity Management System 

      Fongen, Anders; Mancini, Federico (2013)
      The use of integrity protection mechanisms from a tactical Identity Management (IdM) system is the focus of this paper. While traditional identity management systems supports authentication, and some also access control, ...
    • Intrusion tolerant systems 

      Fongen, Anders (2007)
      Security intrusions and successful attacks on computer systems will occur regardless of the quality of the control and protection systems in use. It is therefore necessary to build computer systems that offer essential ...
    • Model and specification for analyzing the scalability of a public key infrastructure 

      Winjum, Eli; Fongen, Anders (2009)
      Most security mechanisms rely on cryptographic keys and other secret values. Key management is crucial. A Public Key Infrastructure (PKI) is commonly established as a basis for key management. So far, PKIs have been ...
    • Optimization of protocol operations in a Public Key Infrastructure 

      Fongen, Anders (2010)
      The protocol operations in a Public Key Infrastructure may be optimized in different ways. This report offers an introduction to the problem area, an analysis of the scalability properties of the relevant PKI operations, ...
    • Population Based Routing in LEO Satellite Networks 

      Fongen, Anders; Landmark, Lars (2022-06-26)
      Packet switching in a Low Earth Orbit (LEO) satellite network may calculate the best traffic route through the less populated areas of the planet, in order to avoid relaying through the busiest satellites. A number of ideas ...
    • Towards NNEC - breaking the interaction barrier with collaboration services 

      Gjørven, Eli; Johnsen Frank Trethan; Fongen, Anders; Bloebaum, Trude H.; Reitan, Bård Karsten (2014-09-25)
      The Norwegian armed forces intend to reach NATO Network Enabled Capability (NNEC) maturity level 4 within 2030. The realization of NNEC is essential in developing the future tactical Command and Control (C2) systems for ...
    • Trust Management in Cross Domain Operations 

      Fongen, Anders (2015)
      Protocols for communication across security domains need to be evaluated against their architectural properties, not only their security properties. The protocols have connectivity and capacity requirements, they have ...
    • Trusted Service Discovery Through Identity Management 

      Fongen, Anders; Hafsøe, Trude (2013)
      Service oriented environments face threats from unauthorized clients and fake or compromised services. The threats exist both during service discovery and service invocation, and should be mitigated through the same security ...
    • XML Based Certificate Management 

      Fongen, Anders (2008)
      The need for key management in SOA-based systems is addressed in this report. The report starts with a presentation of key management principles and a discussion of the problem posed by the PKI (Public Key Infrastructure) ...