Now showing items 1-8 of 8

    • Communities of Trust in Tactical Coalition Networks 

      Fongen, Anders; Salmanian, Mazda (2014)
      The need for information exchange between security domains has traditionally been approached through the use of guards and security labels. Although these technologies are thoroughly researched and exist in mature ...
    • Cooperative Caching in Space Information Networks 

      Fongen, Anders; Landmark, Lars (2022-05-22)
      Members of a Low Earth Orbit (LEO) satellite group need to coordinate their activities in order to improve the quality and timeliness of the services provided to terrestrial clients. As a report from a work in progress, ...
    • Federated Identity Management in a Tactical Multi-Domain Network 

      Fongen, Anders (2011)
      Identity Management maintains information regarding actors of an Information System, like users, equipment and services. One important service is to disseminate and validate credentials for the purpose of authentication ...
    • High assurance information exchange based on publish-subscribe and ABAC methods 

      Fongen, Anders; Mancini, Federico (2014)
      The presented effort employs a combination of publish-subscribe distribution and ABAC (Attribute Based Access Control) methods to control the information exchange between security domains. It follows strictly the "separation ...
    • The Integration of Trusted Platform Modules into a Tactical Identity Management System 

      Fongen, Anders; Mancini, Federico (2013)
      The use of integrity protection mechanisms from a tactical Identity Management (IdM) system is the focus of this paper. While traditional identity management systems supports authentication, and some also access control, ...
    • Population Based Routing in LEO Satellite Networks 

      Fongen, Anders; Landmark, Lars (2022-06-26)
      Packet switching in a Low Earth Orbit (LEO) satellite network may calculate the best traffic route through the less populated areas of the planet, in order to avoid relaying through the busiest satellites. A number of ideas ...
    • Trust Management in Cross Domain Operations 

      Fongen, Anders (2015)
      Protocols for communication across security domains need to be evaluated against their architectural properties, not only their security properties. The protocols have connectivity and capacity requirements, they have ...
    • Trusted Service Discovery Through Identity Management 

      Fongen, Anders; Hafsøe, Trude (2013)
      Service oriented environments face threats from unauthorized clients and fake or compromised services. The threats exist both during service discovery and service invocation, and should be mitigated through the same security ...