Browsing Articles by Author "Fongen, Anders"
Now showing items 1-8 of 8
-
Communities of Trust in Tactical Coalition Networks
Fongen, Anders; Salmanian, Mazda (2014)The need for information exchange between security domains has traditionally been approached through the use of guards and security labels. Although these technologies are thoroughly researched and exist in mature ... -
Cooperative Caching in Space Information Networks
Fongen, Anders; Landmark, Lars (2022-05-22)Members of a Low Earth Orbit (LEO) satellite group need to coordinate their activities in order to improve the quality and timeliness of the services provided to terrestrial clients. As a report from a work in progress, ... -
Federated Identity Management in a Tactical Multi-Domain Network
Fongen, Anders (2011)Identity Management maintains information regarding actors of an Information System, like users, equipment and services. One important service is to disseminate and validate credentials for the purpose of authentication ... -
High assurance information exchange based on publish-subscribe and ABAC methods
Fongen, Anders; Mancini, Federico (2014)The presented effort employs a combination of publish-subscribe distribution and ABAC (Attribute Based Access Control) methods to control the information exchange between security domains. It follows strictly the "separation ... -
The Integration of Trusted Platform Modules into a Tactical Identity Management System
Fongen, Anders; Mancini, Federico (2013)The use of integrity protection mechanisms from a tactical Identity Management (IdM) system is the focus of this paper. While traditional identity management systems supports authentication, and some also access control, ... -
Population Based Routing in LEO Satellite Networks
Fongen, Anders; Landmark, Lars (2022-06-26)Packet switching in a Low Earth Orbit (LEO) satellite network may calculate the best traffic route through the less populated areas of the planet, in order to avoid relaying through the busiest satellites. A number of ideas ... -
Trust Management in Cross Domain Operations
Fongen, Anders (2015)Protocols for communication across security domains need to be evaluated against their architectural properties, not only their security properties. The protocols have connectivity and capacity requirements, they have ... -
Trusted Service Discovery Through Identity Management
Fongen, Anders; Hafsøe, Trude (2013)Service oriented environments face threats from unauthorized clients and fake or compromised services. The threats exist both during service discovery and service invocation, and should be mitigated through the same security ...