I. Introduction
Despite their widespread use, Authentication and Authorization Infrastructures (AAIs) such as RADIUS-based network access controllers does not implement security mechanisms able to tolerate advanced persistent threads [1], [2], large scale distributed denial of service [3], [4] or even to protect authentication information confidentiality in case of intrusions. Beyond that, current available and widely deployed services such as RADIUS and OpenID have several vulnerabilities regarding their security and dependability [5]. Given the importance AAIs in modern networked systems, these limitations can be considered as one of top threats in future network environments [5].