Centralized Authorization Service (CAuthS) or Authorization as a Service (AuthaaS)—A Conceptual Architecture
نویسندگان
چکیده
Absence of architecture to describe how to implement authorization as a centralized service, in a way similar to authentication , has been causing redundant deployment of computing resources, lack of standard practices, and never-ending learning curve in maintaining proprietary or ad hoc authorization solutions. The paper develops an architecture, which focuses on centralization of authorization, to be called Centralized Authorization Service (CAuthS) or Authorization as a Service (AuthaaS), when deployed as a service, and is targeted to substitute platform-based ad hoc authorization solutions.
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملUbiquitous Air Quality Monitoring System with Service Oriented Architecture Middleware
We have been developing AirScope, an event-based air quality monitoring system, since 2008 and regularly add new features to it. The first version of AirScope is up and running on desktop and mobile platforms; however, it is limited in its capability to assimilate new sensors and components from other parties. In order to add third party components, extensive manual integration is required. In ...
متن کاملAuthorization Control in Business Collaboration
Authorization control has been well studied for years, and there are quite a few theories and techniques available for handling access control for a single or a centralized system. However unique and challenging security issues concerning business collaboration in the context of service oriented computing (SOC) have arisen due to the dynamic and loosely coupling nature of the environment in whi...
متن کاملIDfusion An Open-Architecture for Kerberos based Authorization
Since its initial development Kerberos has evolved to become the widely accepted system for implementing centralized authentication services. During this time the Lightweight Directory Access Protocol (LDAP) has become the accepted method for the centralized distribution of identity information. Organizations increasingly deploy both infra-structural components in order to support management of...
متن کاملEngineering Authorization Services for the Service Oriented Architecture
The service-oriented architecture (SOA) can be used to build new solutions leveraging services, to cleave together existing applications or to cleave apart existing applications. The SOA provides many benefits such as cost saving to organizations by increasing the speed of implementation of any application(s) required and reducing the expenditure on integration technologies. However, security i...
متن کامل