Secure Mediation: Requirements and Design

نویسندگان

  • Joachim Biskup
  • Ulrich Flegel
  • Yücel Karabulut
چکیده

In this paper 1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on conndentiality and authenticity. Furthermore we outline the design of the basic security mechanisms for mediators. Our basic approach suitably combines the concepts of credentials, for authentic authorization with some kind of anonymity , and of asymmetric encryption, for conndentiality, and it can be extended to include additional mechanisms like digital signatures and ngerprints. Additionally it adopts the model of role based security policies because of its application orientation and of its potentials to integrate and unify various policies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Mediation: Requirements, Design, and Architecture

In mediated information systems clients and various autonomous sources are brought together by mediators. The mediation paradigm needs powerful and expressive security mechanisms considering the dynamics and conflicting interests of the mediation participants. Firstly, we discuss the security requirements for mediation with an emphasis on confidentiality and authenticity. We argue for basing th...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

رابطه سبک‌ دلبستگی با تعهد زناشویی با میانجی‌گری تمایزیافتگی خود و احساس گناه در دانشجویان زن متأهل شهر اهواز

Abstract Objective: the objective of present study is examining the causal relationship between attachment styles with marital commitment by mediation of differentiation of self and guilty feeling in married female students of Ahvaz city. Methodology: participants in this study were in total 211 married female students of Ahvaz city, which were selected using available purposive sampling. Th...

متن کامل

Towards Secure Mediation

A secure mediated information system should support scenarious where dynamically changing information sources advertise their information resources, and application speciic mediators collect and assemble these resources into useful information in order to support the requests of their spontaneous clients. While doing this, the mediators should enforce security constraints in the application env...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998