Role signatures for access control in open distributed systems

被引:0
|
作者
Crampton, Jason [1 ]
Lim, Hoon Wei [2 ]
机构
[1] Univ London, Informat Secur Grp, London WC1E 7HU, England
[2] SAP Res, Antipolis, France
来源
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE | 2008年
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote resources may be unknown to the authorization service that controls access to the requested resources. Hence, it seems inevitable that predefined mappings of principals in one domain to those in the domain containing the resources are needed. In addition, verifying the authenticity of user credentials or attributes can be difficult. In this paper, we propose the concept of role signatures to solve these problems by exploiting the hierarchical namespaces that exist in many distributed systems. Our approach makes use of a hierarchical identity-based signature lure scheme: verification keys are based on generic role identifiers defined within a hierarchical namespace. The verification of a role signature serves to prove that the signer is an authorized user and is assigned to one or more roles. Individual member organizations of a virtual organization are not required to agree on principal mappings beforehand to enforce access control to resources. Moreover, user authentication and credential verification is unified in our approach and can be achieved through a single role signature.
引用
收藏
页码:205 / +
页数:3
相关论文
共 50 条
  • [1] Role based access control in distributed systems
    Vandenwauver, M
    Govaerts, R
    Vandewalle, J
    COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 169 - 177
  • [2] Access control based on code identity for open distributed systems
    Cirillo, Andrew
    Riely, James
    TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 169 - +
  • [3] Coordination and access control in open distributed agent systems: The TuCSoN approach
    Cremonini, M
    Omicini, A
    Zambonelli, F
    COORDINATION LANGUAGES AND MODELS, PROCEEDINGS, 2000, 1906 : 99 - 114
  • [4] Access control in an open distributed environment
    Hayton, RJ
    Bacon, JM
    Moody, K
    1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 3 - 14
  • [5] Access control in distributed systems
    Bacon, J
    Moody, K
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 21 - 28
  • [6] Access Control in Distributed Systems
    Stojmenovic, Ivan
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1 - 2
  • [7] Towards a refinement of the open distributed systems interactions signatures
    Reda, Oussama
    El Ouahidi, Bouabid
    Bourget, Daniel
    WSEAS Transactions on Communications, 2007, 6 (04): : 601 - 607
  • [8] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60
  • [9] A Trust-Driven Role Based Access Control for Open Systems
    Guo, Yajun
    Dong, Huihui
    Yu, Zhongqiang
    Chen, Hao
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 222 - 225
  • [10] Access Control for Emerging Distributed Systems
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2018, 51 (10) : 100 - 103