Design of Integration Security System using XML Security
نویسندگان
چکیده
In this paper, we design an integration security system that provides authentication service, authorization service, and management service of security data and a unified interface for the management service. The interface is originated from XKMS protocol and is used to manage security data such as XACML policies, SAML assertions and other authentication security data including public keys. The system includes security services such as authentication, authorization and delegation of authentication by employing SAML and XACML based on security data such as authentication data, attributes information, assertions and polices managed with the interface in the system. It also has SAML producer that issues assertions related on the result of the authentication and the authorization services. Keywords—XML, XML Security, XACML.
منابع مشابه
A Comprehensive Model to Enhance Performance of WS-Security Processing
Service Oriented Architecture with Simple Object Access Protocol based Web Services enable flexible software system integration, especially in heterogeneous environments. These web services require proper security when they communicate critical information. These services are exposed to a variety of external threats and attacks. Therefore, security is an important issue for Web Services. Severa...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملPOS System Design in Security Level 1 st Seok -
POS system is a supply net administration system for customer management. It becomes an essential element in distribution industry to construct database, and uses XML-Encryption to complement PKI techniques and standards for security. POS system has four advantages. First, it does not have to be certificated and transmit data every time because there is no server. Second, it can integrate datab...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملAn XML-based Security Management Model for Multilevel Security Databases
This paper proposes a universal architecture of Security Management Model (SMM) for integrating security features namely low-level access control at row and column level of relational legacy databases using XML as an integration medium. The proposed model integrates and then rearranges, controls, and manages the new and inherent low-level access control attributes based on Rule-Based Algorithm ...
متن کامل