World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Aaa Authorization Application Examples

By Vollbrecht, J.

Click here to view

Book Id: WPLBN0000693796
Format Type: PDF eBook
File Size: 111.86 KB.
Reproduction Date: 2005

Title: Aaa Authorization Application Examples  
Author: Vollbrecht, J.
Volume:
Language: English
Subject: Electronic Commerce, Commerce, Fine Arts
Collections: Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Vollbrecht, J. (n.d.). Aaa Authorization Application Examples. Retrieved from http://hawaiilibrary.net/


Description
Technical Reference Publication

Excerpt
Introduction: This document is one of a series of three documents under consideration by the AAAarch RG dealing with the authorization requirements for AAA protocols. The three documents are: // AAA Authorization Framework // [2] AAA Authorization Requirements // [3] AAA Authorization Application Examples (this document) // In this memo, we examine several important Internet applications that require authorization. For each application, we present a model showing how it might do authorization and then map that model back to the framework presented in [2]. We then present the authorization requirements of the application as well as we presently understand them. The requirements presented in this memo have been collected together, generalized, and presented in [3].

Table of Contents
Table of Contents 1. Introduction ................................................ 3 2. PPP Dialin with Roaming ..................................... 4 2.1. Descriptive Model ...................................... 4 2.2. Authorization Requirements ............................. 6 3. Mobile-IP ................................................... 6 3.1. Relationship to the Framework .......................... 10 3.2. Minimized Internet Traversal ........................... 10 3.3. Key Distribution ....................................... 10 3.4. Mobile-IP Authorization Requirements ................... 11 4. Bandwidth Broker ............................................ 12 4.1. Model Description ...................................... 13 4.2. Components of the Two-Tier Model ....................... 13 4.3. Identification of Contractual Relationships ............ 13 4.3.1. Single-Domain Case .............................. 14 4.3.2. Multi-Domain Case ............................... 15 4.4. Identification of Trust Relationships .................. 16 4.5. Communication Models and Trust Relationships ........... 18 4.6. Bandwidth Broker Communication Models .................. 19 4.6.1. Concepts ........................................ 19 4.6.1.1. Intra-Domain Authorization ............... 19 4.6.1.2. Inter-Domain Authorization ............... 19 4.6.2. Bandwidth Broker Work Phases .................... 20 4.6.3. Inter-Domain Signaling .......................... 20 4.6.3.1. Phase 0 .................................. 20 4.6.3.2. Phase 1 .................................. 20 4.6.4. Bandwidth Broker Communication Architecture ..... 22 4.6.5. Two-Tier Inter-Domain Model ..................... 23 4.6.5.1. Session Initialization ................... 23 4.6.5.2. Service Setup ............................ 23 4.6.5.3. Service Cancellation ..................... 24 4.6.5.4. Service Renegotiation .................... 24 4.6.5.5. RAR and RAA .............................. 24 4.6.5.6. Session Maintenance ...................... 24 4.6.5.7. Intra-domain Interface Protocol .......... 24 4.7. Requirements ........................................... 24 5. Internet Printing ........................................... 25 5.1. Trust Relationships .................................... 26 5.2. Use of Attribute Certificates .......................... 27 5.3. IPP and the Authorization Descriptive Model ............ 28 6. Electronic Commerce ......................................... 29 6.1. Model Description ...................................... 30 6.1.1. Identification of Components .................... 30 6.1.2. Identification of Contractual Relationships ..... 31 6.1.3. Identification of Trust Relationships ........... 32 6.1.3.1. Static Trust Relationships ............... 33 6.1.3.2. Dynamic Trust Relationships .............. 35

 

Click To View

Additional Books


  • Bulletn (by )
  • Banking Reform (by )
  • Banking Law of New York : Chapter 2 of C... (by )
  • Bulletin (by )
  • Bell Street Chapel Discourses (by )
  • Banking Laws of the State of Missouri : ... (by )
  • Boston : An Old City with New Opportunit... (by )
  • Best's Key Ratings and Insurance Manual (by )
  • Best's Key Ratings of All Licensed Joint... (by )
  • Best's Key Ratings and Insurance Manual (by )
  • Bell Street Chapel Discourses (by )
  • Bell Street Chapel Discourses (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.