Trust enhanced distributed authorisation for web services

نویسندگان

  • Aarthi Nagarajan
  • Vijay Varadharajan
  • Nathan Tarr
چکیده

a r t i c l e i n f o a b s t r a c t In this paper, we propose a trust enhanced distributed authorisation architecture (TEDA) that provides a holistic framework for authorisation taking into account the state of a user platform. The model encompasses the notions of 'hard' and 'soft' trust to determine whether a platform can be trusted for authorisation. We first explain the rationale for the overall model and then describe our hybrid model with 'hard' and 'soft' trust components, followed by a description of the system architecture. We then illustrate our implementation of the proposed architecture in the context of authorisation for web services. We discuss the results and demonstrate that such a trust enhanced approach could enable better authorisation decision making, especially in a distributed environment where user platforms are subject to dynamic security threats. Distributed systems have fundamentally changed the way individuals and enterprises share, process and store information today. Security issues, and authorisation in particular play a vital role in distributed systems, as greater availability and access to information in turn imply that there is a greater need to protect them. To address this issue, several access control mechanisms, languages and systems [1–7] have been proposed in the past. However, a majority of these systems have been designed to address authorisation requirements that relate to human users. Authentication systems based on passwords, identity certificates, role certificates or even bio-metric information like fingerprints and iris recognition have been developed. Issues of trust arise when one considers whether or how much to trust the certificates or credentials being provided. Trust management systems have evolved from distributed authentication and authorisation systems taking into account aspects such as the nature and the roles of the authorities involved, the types of credentials and attributes to be used in the verification process, the delegation and revocation of credentials involved and the roles played. However many of these secure systems (be they authorisation or authentication) make some basic assumptions about the state of the platform that is hosting and running the systems software and applications. There is an inherent trust that is placed on the underlying platform when an upper level user or an application is authenticated or authorised. In the current networked world with heterogeneous platforms and numerous software applications and system software running on these platforms, it is important such underlying trust assumption …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the design, implementation and application of an authorisation architecture for web services

This paper proposes an authorisation architecture for web services. It describes the architectural framework, the administration and runtime aspects of our architecture and its components for secure authorisation of web services as well as the support for the management of authorisation information. The paper then describes the implementation aspects of the architecture. The architecture has be...

متن کامل

Web services access control architecture incorporating trust

Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of users. Design/methodology/approach – A literature review is presented to provide background to the progressive role that trust plays in access control architectures. The web services access control architecture is define...

متن کامل

Secure Hardware-based Distributed Authorisation Underpinning a Web Service Framework

This paper presents a distributed authorisation model suitable for use in a web service framework where multiple parties are involved in performing a particular transaction. The authorisation model uses a third party authorisation service that checks users or services’ credentials against a set of authorisation policies. A traditional service provision model does not scale well for such transac...

متن کامل

Synchronisation in Trust Management Using Push Authorisation

Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider this a pull authorisation strategy: the authorisation decision reflects the current and/or past authorisations. In this paper, we examine this pull strategy and propose an alternative form of authorisation in a distribute...

متن کامل

D-FOAF: Distributed Identity Management with Access Rights Delegation

Todays WWW consists of more than just information. The WWW provides a large number of services, which often require identification of it’s users. This has lead to the fact that today users have to maintain a large number of different credentials for different websites distributed or shared identification systems are not widely deployed. Furthermore, current authorisation systems require strict ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Comput. Syst. Sci.

دوره 80  شماره 

صفحات  -

تاریخ انتشار 2014