An Authentication Service for Open Network Systems. In

نویسنده

  • G. Fisher
چکیده

26 In this paper, we have omitted discussion of many of the more practical details due to length limitation. For example, the problems of consistency (due to cache invalidation and certiicate expiration), group membership maintenance and propagation of authorization must be addressed in an implementation. A prototype implementation of our design is currently under way. We have nished implementing an authentication substrate upon which our authorization service operates. We are now mainly focused on nding eecient evaluation strategies for GACL. We plan to report our implementation results in a future paper, which would also address the practical details mentioned above. For future work, we are considering the following directions: (1) To develop a better understanding of anonymous authorization. In particular, a Principle of Minimal Identity (i.e., a client should be allowed to supply only the minimal identiication required to obtain authorization) should be formulated and studied. (2) To design an incremental update procedure so that an authorization server can incorporate new authorizations from an end server in an eecient manner. (3) To develop compilation strategies for the GACL language. (4) To propose and study an API for integrating our authorization service into application programs. 25 for services that manage a large number of objects with complex dependencies. Its formal semantics facilitates the implementation of diierent evaluation strategies that can interop-erate. The use of a declaration section is novel. It provides directives for choosing the most eecient evaluation strategy. For example, an unordered gacl can potentially make use of direct hashing in its evaluation, while an ordered gacl allows a partial evaluation strategy. The language of policy base proposed in 20] is more general than GACL (in particular, it subsumes rst-order logic) and has a much more abstract semantics. The GACL language is intended to be practical, and can indeed express the basic structural properties identiied in 20], though not in their full generality. Moreover, the semantics of GACL is more procedural, as opposed to the declarative nature of the semantics of the language of policy base. The use of a declaration section also adds to the practicality of GACL. Authenticated delegation has been used and studied in other works 2, 4, 6, 15]. Most of these works, with the notable exception of Neuman's 15], concentrates on the authentication and operational aspects of delegation rather than its application. The work reported in 2, 6] presents a formal understanding of authenticated delegation. …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

A Case for Open Network Health Systems: Systems as Networks in Public Mental Health

Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH) services in the Netherlands. Decentralized under the (Community) Participation Act (2014), local governments must find resources to compensate for reduced central funding to such services or “innovate.” But innovation, even when pressure for c...

متن کامل

Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication

The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998