PERMIS: a modular authorization infrastructure
نویسندگان
چکیده
منابع مشابه
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users. This paper describes the PERMIS role based authorization infrastructure along with its conceptual authorization, access control, and trust models. PERMIS has the novel concept of a credential validation service, which...
متن کاملBuilding a Modular Authorization Infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users. This paper describes the PERMIS role based authorization infrastructure along with its conceptual authorisation, access control, and trust models. PERMIS has the novel concept of a credential validation service, which...
متن کاملA Comparison of the Akenti and PERMIS Authorization Infrastructures
Introduction This paper describes the similarities and differences between the Akenti and PERMIS authorisation infrastructures. It describes their features, ease of use and performance statistics. This report was compiled from: a desk comparison of published documentation, by talking to the authors of both infrastructures, and by building both infrastructures along with a test application. The ...
متن کاملTowards an Infrastructure for Authorization Position Paper
In recent years, there has been a great deal of debate about whether a large-scale \publickey infrastructure" is needed for electronic commerce and, if so, whether the technical di culty of building and deploying such an infrastructure will impede the growth of electronic commerce. We argue here that much of the controversy is attributable to the fact that the term \public-key infrastructure" h...
متن کاملA Proposal for Extending the Eduroam Infrastructure with Authorization Mechanisms
Identity federations are emerging in the last years in order to make easier the deployment of resource sharing environments among organizations. One common feature of those environments is the use of access control mechanisms based on the user identity. However, most of those federations have realized that user identity is not enough to offer a more grained access control and value added servic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Concurrency and Computation: Practice and Experience
سال: 2008
ISSN: 1532-0626,1532-0634
DOI: 10.1002/cpe.1313