Architecting Dependable Access Control Systems for Multi-domain Computing Environments

作者: Maciej P. Machulak , Simon E. Parkin , Aad van Moorsel

DOI: 10.1007/978-3-642-10248-6_3

关键词:

摘要: Modern computing systems are built based on Service Oriented Architectures and made up of multiple distributed components. They often span separate autonomous domains administration involve dynamic collaboration. Resources services exposed as Web Services that a natural choice for achieving interoperability in heterogeneous environment. Access control ensure protected against unauthorised access. Architecting such multi-domain environments poses numerous challenges must be considered. Such modular, extensible should have reusable Authorisation needs to administration, scale large user resource bases efficient enough handle even fine-grained interactions between highly components. In this paper we present requirements analysis architecting dependable access environments. In particular, address those SOA use the underlying connection technology. We refer relevant standards technologies significant importance when

参考文章(46)
David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli, David Ferraiolo, D. Richard Kuhn Ramaswamy Chandramouli, Role-Based Access Control, Second Edition ,(2007)
Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, XACML policies for exclusive resource usage Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security. pp. 275- 290 ,(2007) , 10.1007/978-3-540-73538-0_20
Vijay Machiraju, Harumi Kuno, Gustavo Alonso, Fabio Casati, Web Services: Concepts, Architectures and Applications ,(2003)
R. Alfieri, R. Cecchini, V. Ciaschini, L. dell’Agnello, Á. Frohner, A. Gianoli, K. Lõrentey, F. Spataro, VOMS, an Authorization System for Virtual Organizations Lecture Notes in Computer Science. pp. 33- 40 ,(2003) , 10.1007/978-3-540-24689-3_5
Adam J. Lee, Marianne Winslett, Towards Standards-Compliant Trust Negotiation for Web Services international conference on trust management. pp. 311- 326 ,(2008) , 10.1007/978-0-387-09428-1_20
Anirban Chakrabarti, Grid computing security ,(2007)
W.H. Winsborough, K.E. Seamons, V.E. Jones, Automated trust negotiation darpa information survivability conference and exposition. ,vol. 1, pp. 88- 102 ,(2000) , 10.1109/DISCEX.2000.824965