ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 論文誌(ジャーナル)
  2. Vol.65
  3. No.3

Linking Contexts from Distinct Data Sources in Zero Trust Federation

https://ipsj.ixsq.nii.ac.jp/records/233358
https://ipsj.ixsq.nii.ac.jp/records/233358
b8d811d3-b033-4d4f-b3a9-89611edb5f56
名前 / ファイル ライセンス アクション
IPSJ-JNL6503005.pdf IPSJ-JNL6503005.pdf (521.5 kB)
 2026年3月15日からダウンロード可能です。
Copyright (c) 2024 by the Information Processing Society of Japan
非会員:¥0, IPSJ:学会員:¥0, 論文誌:会員:¥0, DLIB:会員:¥0
Item type Journal(1)
公開日 2024-03-15
タイトル
タイトル Linking Contexts from Distinct Data Sources in Zero Trust Federation
タイトル
言語 en
タイトル Linking Contexts from Distinct Data Sources in Zero Trust Federation
言語
言語 eng
キーワード
主題Scheme Other
主題 [特集:well-beingなネットワーク環境構築のためのインターネットと運用技術(推薦論文)] access control, context and zero trust
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
著者所属
Kyoto University
著者所属
Kyoto University
著者所属
Kyoto University
著者所属(英)
en
Kyoto University
著者所属(英)
en
Kyoto University
著者所属(英)
en
Kyoto University
著者名 Masato, Hirai

× Masato, Hirai

Masato, Hirai

Search repository
Daisuke, Kotani

× Daisuke, Kotani

Daisuke, Kotani

Search repository
Yasuo, Okabe

× Yasuo, Okabe

Yasuo, Okabe

Search repository
著者名(英) Masato, Hirai

× Masato, Hirai

en Masato, Hirai

Search repository
Daisuke, Kotani

× Daisuke, Kotani

en Daisuke, Kotani

Search repository
Yasuo, Okabe

× Yasuo, Okabe

en Yasuo, Okabe

Search repository
論文抄録
内容記述タイプ Other
内容記述 An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses the information of users and devices, called context, to verify access requests. Zero Trust Federation (ZTF) has been proposed as a framework for extending an idea of identity federation to support ZTA by sharing contexts among participants in the federation. ZTF defines Context Attribute Provider (CAP) as the entity that collects context and provides it to each organization (Relying Party; RP) that needs context for verification based on ZTA. For precise verification, CAPs need to collect context from various data sources. However, ZTF did not provide a method for collecting context from data sources other than RP although collecting contexts is essential to realize ZTF. In this research, as a general method for collecting context in ZTF, we propose a method of linking identifiers between the data source and CAP. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.32(2024) (online)
DOI http://dx.doi.org/10.2197/ipsjjip.32.288
------------------------------
論文抄録(英)
内容記述タイプ Other
内容記述 An access control model called Zero Trust Architecture (ZTA) has attracted attention. ZTA uses the information of users and devices, called context, to verify access requests. Zero Trust Federation (ZTF) has been proposed as a framework for extending an idea of identity federation to support ZTA by sharing contexts among participants in the federation. ZTF defines Context Attribute Provider (CAP) as the entity that collects context and provides it to each organization (Relying Party; RP) that needs context for verification based on ZTA. For precise verification, CAPs need to collect context from various data sources. However, ZTF did not provide a method for collecting context from data sources other than RP although collecting contexts is essential to realize ZTF. In this research, as a general method for collecting context in ZTF, we propose a method of linking identifiers between the data source and CAP. Then, we implemented our method using RADIUS and MDM as data sources and confirmed that their contexts could be collected and used.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.32(2024) (online)
DOI http://dx.doi.org/10.2197/ipsjjip.32.288
------------------------------
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AN00116647
書誌情報 情報処理学会論文誌

巻 65, 号 3, 発行日 2024-03-15
ISSN
収録物識別子タイプ ISSN
収録物識別子 1882-7764
公開者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 10:07:22.946778
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3