A distributed authorization infrastructure taking into account data protection aspects

被引:0
|
作者
Dürbeck S. [1 ]
Kolter J. [1 ]
Pernul G. [1 ]
Schillinger R. [1 ]
机构
[1] Lehrstuhl für Wirtschaftsinformatik i - Informationssysteme, Universität Regensburg, 93053 Regensburg
关键词
D O I
10.1007/s00287-009-0411-0
中图分类号
学科分类号
摘要
Common best-of-breed practices of authorisation and access control are not capable of meeting today's requirements for the management of user privileges and enforcing a security strategy in scalable and highly flexible distributed systems. Some security infrastructures, so called AAIs - authentication and authorization infrastructures - and PMIs - privilege management infrastructures - are better suited and capable of offering fully-fledged security services in a federation of systems out of various domains. This article comprises a privacyoriented AAI for eGovernment that incorporates attribute-based access control and a XACMLbased security architecture to enforce privacy when it comes to propagating user attributes across system boundaries. © 2011 Springer-Verlag.
引用
收藏
页码:265 / 275
页数:10
相关论文
共 50 条
  • [1] Distributed authorization and authentication framework for a grid infrastructure
    Sun, Hung-Min
    Wang, King-Hang
    Kebbeh, Pa Saffiong
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 993 - +
  • [2] Attribute-based interactions in a distributed authentication and authorization infrastructure
    López, DR
    Castro-Rojo, R
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 438 - 442
  • [4] WDAI: a simple World Wide Web distributed authorization infrastructure
    Kahan, J
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL WORLD WIDE WEB CONFERENCE, 1999, : 521 - 531
  • [5] WDAI: a simple World Wide Web distributed authorization infrastructure
    Kahan, J
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (11-16): : 1599 - 1609
  • [6] WDAI: A simple World Wide Web distributed authorization infrastructure
    Kahan, José
    Computer Networks, 1999, 31 (11): : 1599 - 1609
  • [7] Taking Account of Organisational Aspects of HTA Reports
    Perleth, Matthias
    ZEITSCHRIFT FUR EVIDENZ FORTBILDUNG UND QUALITAET IM GESUNDHEITSWESEN, 2008, 102 (02): : 85 - 91
  • [8] Developing a distributed system for infrastructure protection
    Cybenko, George
    Jiang, Guofei
    IT Professional, 2000, 2 (04) : 17 - 22
  • [9] Theoretical Aspects of Critical Infrastructure Protection
    Hofreiter, Ladislav
    Zvakova, Zuzana
    DURABILITY OF CRITICAL INFRASTRUCTURE, MONITORING AND TESTING, ICDCF 2016, 2017, : 139 - 147
  • [10] Authorization of data access in distributed storage systems
    Feichtinger, D
    Peters, AJ
    2005 6TH INTERNATIONAL WORKSHOP ON GRID COMPUTING (GRID), 2005, : 172 - 178