S. Farrell's scientific contributions

Publications (5)

Article
This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols.

Citations

... For the user to access their GCS data seamlessly, the Demigod services also applies a few permissions on the buckets, abiding by the Authentication, Authorization, and Accounting (AAA) principle [9] and the Principle of Least Privilege [10]. The user's GSuite identity and their shadow service account identity get "owner" permissions on the GCS bucket. ...
... In Fig. 4, mLMA and mAAA.C represent the LMA and the AAA.C that are close to the cell which the MN is trying to connect to. When the MN tries to connect to a cell for the first time, MAG detects the MN Attached Event and sends an AAA Req message to the AAA.C using a MN-Id [5][6][7]. Because it is the MN's first time connecting to this home network, the AAA.C does not have any information about the MN. ...
... The 802.1X architecture provides three entities involved in the communication: the supplicant (S) that represents the client or the peer that asks for network access; the authenticator (A) that is the AP that offers the access service; the authentication server (AS) that is represented by the server that realises the authentication and the authorization phases toward the client such as remote authentication dial in user service (RADIUS), and DIAMETER [17,18] (see Figure 1). ...
... Access control (AC) is the process of enforcing the system security requirements on protected services and resources [15]. AC determines whether an entity has sufficient privileges to access system resources and what is or is not allowed for the entity to perform. ...