S. Farrell's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (5)
This memo serves as the base requirements for Authorization of Internet Resources and Services (AIRS). It presents an architectural framework for understanding the authorization of Internet resources and services and derives requirements for authorization protocols.
Citations
... For the user to access their GCS data seamlessly, the Demigod services also applies a few permissions on the buckets, abiding by the Authentication, Authorization, and Accounting (AAA) principle [9] and the Principle of Least Privilege [10]. The user's GSuite identity and their shadow service account identity get "owner" permissions on the GCS bucket. ...
... In Fig. 4, mLMA and mAAA.C represent the LMA and the AAA.C that are close to the cell which the MN is trying to connect to. When the MN tries to connect to a cell for the first time, MAG detects the MN Attached Event and sends an AAA Req message to the AAA.C using a MN-Id [5][6][7]. Because it is the MN's first time connecting to this home network, the AAA.C does not have any information about the MN. ...
... The 802.1X architecture provides three entities involved in the communication: the supplicant (S) that represents the client or the peer that asks for network access; the authenticator (A) that is the AP that offers the access service; the authentication server (AS) that is represented by the server that realises the authentication and the authorization phases toward the client such as remote authentication dial in user service (RADIUS), and DIAMETER [17,18] (see Figure 1). ...
... Access control (AC) is the process of enforcing the system security requirements on protected services and resources [15]. AC determines whether an entity has sufficient privileges to access system resources and what is or is not allowed for the entity to perform. ...