A distributed authorization infrastructure taking into account data protection aspects

被引:0
|
作者
Dürbeck S. [1 ]
Kolter J. [1 ]
Pernul G. [1 ]
Schillinger R. [1 ]
机构
[1] Lehrstuhl für Wirtschaftsinformatik i - Informationssysteme, Universität Regensburg, 93053 Regensburg
关键词
D O I
10.1007/s00287-009-0411-0
中图分类号
学科分类号
摘要
Common best-of-breed practices of authorisation and access control are not capable of meeting today's requirements for the management of user privileges and enforcing a security strategy in scalable and highly flexible distributed systems. Some security infrastructures, so called AAIs - authentication and authorization infrastructures - and PMIs - privilege management infrastructures - are better suited and capable of offering fully-fledged security services in a federation of systems out of various domains. This article comprises a privacyoriented AAI for eGovernment that incorporates attribute-based access control and a XACMLbased security architecture to enforce privacy when it comes to propagating user attributes across system boundaries. © 2011 Springer-Verlag.
引用
收藏
页码:265 / 275
页数:10
相关论文
共 50 条
  • [41] PRODUCTION OF OPTICALLY PLANE COMPONENTS TAKING INTO ACCOUNT ECONOMIC-ASPECTS
    KROMBACH, W
    F&M-FEINWERKTECHNIK & MESSTECHNIK, 1989, 97 (1-2): : 19 - 21
  • [42] MataNui - A Distributed Storage Infrastructure for Scientific Data
    Kloss, Guy K.
    2013 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, 2013, 18 : 2607 - 2610
  • [43] ELIXIR: a distributed infrastructure for European biological data
    Crosswell, Lindsey C.
    Thornton, Janet M.
    TRENDS IN BIOTECHNOLOGY, 2012, 30 (05) : 241 - 242
  • [44] A SOFTWARE INFRASTRUCTURE FOR DISTRIBUTED DATA MODELS IN CLOUD
    Jelacic, Bojan
    Vukmirovic, Srdan
    Stoja, Sebastijan
    2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 845 - +
  • [45] Quantum effect in production model taking into account deficiency of floating assets and trading infrastructure
    Obrosova, N. K.
    Shananin, A. A.
    TRUDY INSTITUTA MATEMATIKI I MEKHANIKI URO RAN, 2010, 16 (05): : 127 - 134
  • [46] Special aspects of the development of the security infrastructure for distributed computing systems
    Dubenskaya, Julia
    Demichev, Andrey
    Kryukov, Alexander
    Prikhodko, Nikolay
    4TH INTERNATIONAL YOUNG SCIENTIST CONFERENCE ON COMPUTATIONAL SCIENCE, 2015, 66 : 525 - 532
  • [47] The general principles for the handling of documentation in chemical research laboratory, taking into account the requirements of the protection of personal data- RODO
    Wycislik, Andrzej
    Gajdzik, Bozena
    PRZEMYSL CHEMICZNY, 2018, 97 (11): : 1803 - 1807
  • [48] A distributed authentication and authorization scheme for in-network big data sharing
    Ruidong Li
    Hitoshi Asaeda
    Jie Li
    Xiaoming Fu
    Digital Communications and Networks, 2017, 3 (04) : 226 - 235
  • [49] A distributed authentication and authorization scheme for in-network big data sharing
    Li, Ruidong
    Asaeda, Hitoshi
    Li, Jie
    Fu, Xiaoming
    DIGITAL COMMUNICATIONS AND NETWORKS, 2017, 3 (04) : 226 - 235