Centralized Authorization Service (CAuthS) or Authorization as a Service (AuthaaS)—A Conceptual Architecture

نویسندگان

  • Pranab Das
  • Abhinav Das
  • David F Ferraiolo
  • Ravi Sandhu
  • Serban Gavrila
  • D Richard Kuhn
  • Eric Yuan
  • Jin Tong
  • Shucheng Yu
  • Cong Wang
  • Kui Ren
  • Wenjing Lou
  • Martin Gaedke
  • Johannes Meinecke
  • Martin Nussbaumer
  • Markus Lorch
  • Seth Proctor
  • Rebekah Lepro
  • Dennis Kafura
  • Sumit Shah
  • Nurzhan Nurseitov
  • Michael Paulson
  • Randall Reynolds
  • Paulo Trezentos
  • Jaehong Park
  • Erich Gamma
  • Richard Helm
  • Ralph Johnson
چکیده

Absence of architecture to describe how to implement authorization as a centralized service, in a way similar to authentication , has been causing redundant deployment of computing resources, lack of standard practices, and never-ending learning curve in maintaining proprietary or ad hoc authorization solutions. The paper develops an architecture, which focuses on centralization of authorization, to be called Centralized Authorization Service (CAuthS) or Authorization as a Service (AuthaaS), when deployed as a service, and is targeted to substitute platform-based ad hoc authorization solutions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Ubiquitous Air Quality Monitoring System with Service Oriented Architecture Middleware

We have been developing AirScope, an event-based air quality monitoring system, since 2008 and regularly add new features to it. The first version of AirScope is up and running on desktop and mobile platforms; however, it is limited in its capability to assimilate new sensors and components from other parties. In order to add third party components, extensive manual integration is required. In ...

متن کامل

Authorization Control in Business Collaboration

Authorization control has been well studied for years, and there are quite a few theories and techniques available for handling access control for a single or a centralized system. However unique and challenging security issues concerning business collaboration in the context of service oriented computing (SOC) have arisen due to the dynamic and loosely coupling nature of the environment in whi...

متن کامل

IDfusion An Open-Architecture for Kerberos based Authorization

Since its initial development Kerberos has evolved to become the widely accepted system for implementing centralized authentication services. During this time the Lightweight Directory Access Protocol (LDAP) has become the accepted method for the centralized distribution of identity information. Organizations increasingly deploy both infra-structural components in order to support management of...

متن کامل

Engineering Authorization Services for the Service Oriented Architecture

The service-oriented architecture (SOA) can be used to build new solutions leveraging services, to cleave together existing applications or to cleave apart existing applications. The SOA provides many benefits such as cost saving to organizations by increasing the speed of implementation of any application(s) required and reducing the expenditure on integration technologies. However, security i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015