To allow user applications to securely make use of various lightpath resources distributed across multiple domains in a user-friendly and privacy-preserving way requires identity management functionality. Identity and attribute information has to be provided by the user to allow for authorized access to these resources. An identity management framework can facilitate such information exchange. We describe an architecture and prototype that allows the user to setup an end-to-end lightpath that spans multiple network domains while being in control of the personal credentials he has to provide for that purpose. The architecture combines the user-controlled lightpath paradigm with novel user-centric identity management technology. This combination allows the user transparent and non-intrusive access to multiple services that are required for reservation and utilization of network resources in order to setup an end-to-end lightpath. © 2009 IFIP International Federation for Information Processing.
CITATION STYLE
Hulsebosch, B., De Groote, R., & Snijders, M. (2009). Secure user-controlled lightpath provisioning with user-controlled identity management. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5637 LNCS, pp. 1–14). https://doi.org/10.1007/978-3-642-02627-0_1
Mendeley helps you to discover research relevant for your work.