Trust management in cross domain operations

Protocols for communication across security domains need to be evaluated against their architectural properties, not only their security properties. The protocols have connectivity and capacity requirements, they have implications on system coupling, scalability and management. This paper investigates several trust management mechanisms from the perspective of a list of non-functional requirements. The conclusions have consequences for the organization of Identity Management Systems used in cross-domain applications.

[1]  Anders Fongen Scalability analysis of selected certificate validation scenarios , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[2]  William Yurcik,et al.  A survey of PKI components and scalability issues , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[3]  Anders Fongen,et al.  Identity Management and Integrity Protection in Publish-Subscribe Systems , 2013, IDMAN.

[4]  Anders Fongen,et al.  Federated Identity Management in a Tactical Multi-Domain Network , 2011 .

[5]  A. Fongen Protected and controlled communication between military and civilian networks , 2012, 2012 Military Communications and Information Systems Conference (MCC).

[6]  Anders Fongen Data-centric authorization and integrity control in a Linda tuplespace , 2015, SAC.

[7]  Anders Fongen,et al.  The Integration of Trusted Platform Modules into a Tactical Identity Management System , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[8]  Anders Fongen Optimization of a Public Key Infrastructure , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[9]  Ronald L. Rivest,et al.  Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.

[10]  Peter Gutmann,et al.  PKI: It's Not Dead, Just Resting , 2002, Computer.

[11]  David A. Cooper,et al.  A model of certificate revocation , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[12]  Anders Fongen,et al.  Trusted Service Discovery through Identity Management , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.