D-FOAF: Distributed Identity Management with Access Rights Delegation

نویسندگان

  • Sebastian Ryszard Kruk
  • Slawomir Grzonkowski
  • Adam Gzella
  • Tomasz Woroniecki
  • Hee-Chul Choi
چکیده

Todays WWW consists of more than just information. The WWW provides a large number of services, which often require identification of it’s users. This has lead to the fact that today users have to maintain a large number of different credentials for different websites distributed or shared identification systems are not widely deployed. Furthermore, current authorisation systems require strict centralisation of the authorisation procedure users themselves are usually not enabled to authorise their trusted friends to access services, although often this would be beneficial for services and businesses on the Web. In this article we present D-FOAF, a distributed identity management system which deploys social networks. We show how information inherent in social networks can be utilised to provide community driven access rights delegation and we analyse algorithms for managing distributed identity, authorisation and access rights checking. Finally we show how the social networking information can be protected in a distributed environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

D-foaf - Security Aspects in Distributed User Management System

The contemporary Internet offers various services ranging from electronic newspapers to online social networks. To authorize themselves, users have to register to on-line services. However, most of the authentication and user management systems are incompatible with each other. Therefore the registration process must be repeated each time from the beginning, requiring multiple login-password-si...

متن کامل

Digital Systems Laboratory Series A: Research Reports on the Structure of Delegation Networks on the Structure of Delegation Networks

In new distributed, key-oriented access control systems access rights are delegated by a freely formed network of certiicates. For example, the SPKI public-key infrastructure is being designed for this kind of distributed trust management on the Internet. We formalize the concept of a delegation network and present a formal semantics for the delegation of access rights with certiicates. The cer...

متن کامل

Efficient Verification of Delegation in Distributed Group Membership Management

In ad-hoc networks and other highly distributed and decentralized environments, authorization certificates can be used to control access. Moreover, it is possible to delegate rights listed in the certificate to another users. Several such subsequent delegations build a chain of certificates. Chains of delegation certificates can improve the capability and manageability of systems. Distributed g...

متن کامل

Trust Enforcing and Trust Building, Different Technologies and Visions

Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest their current hardware/software state and can ...

متن کامل

Delegation Constraint Management Delegation Constraint Management

The paper addresses the issue of providing access control via delegation and constraint management across multiple security domains. Specifically, this paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a del...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006