Authentication and authorisation in entrusted unions

Citation data:

Proceedings of 12th Australian Information Security Management Conference, AISM 2014, Page: 56-63

Publication Year:
2014
Usage 179
Downloads 141
Abstract Views 38
Captures 1
Readers 1
Repository URL:
https://ro.ecu.edu.au/ism/175; https://ro.ecu.edu.au/ecuworkspost2013/781
DOI:
10.4225/75/57b660c8343d4
Author(s):
Ayed, Dhouha F.; Camenisch, Jan; Ignatenko, Tanya; Johnstone, Michael N; Koster, Paul; Lange, Brigitta; Petković, Milan; Sommer, Dieter; Zic, John
Publisher(s):
Edith Cowan University; Security Research Institute (SRI), Edith Cowan University
Tags:
Computer Science; Arts and Humanities; Security; Authentication; Authorisation; Encryption; Computer System Architecture; Other Computer Sciences; Information Security
conference paper description
This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported.