A Decentralized Authorization Mechanism for E-Business Applications
نویسنده
چکیده
E-business applications need robust and powerful mechanisms to authorize security-critical actions. This actions can be very complex, since they can be initiated not only by human users but also by applications or software agents. Existing authorization mechanisms do not scale for large number of users if the trust relations are dynamic and fail to provide reliable authorization among strangers. Our mechanism uses authorization relevant attributes to define the policy. The attributes are assigned to principals in a decentralized manner. We also present a method to reduce the financial losses which may arise if the authorization mechanism fails. We conclude the paper with our plans for future research.
منابع مشابه
Policy Based Framework for Trust Management and Evolution of Peer to Peer Groups
Peer to peer collaborative groups are becoming increasingly popular for collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games. The decentralized nature of these groups gives rise to the need of a secure group layer which integrates authentication, admission control, authorization, access control and key management. ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملA Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting
Providing network infrastructure for authenti-cation, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over the global Internet is a challenging problem. The infrastructure needs to support large numbers of clients and services, and also to provide secure resources sharing between applications and across organizations. This paper de...
متن کاملInter-domain authorization and delegation for business-to-business e-commerce
Security exposures are viewed as a major impediment to the growth of electronic commerce over Internet. The main requirement of inter-enterprise communications is the verification of the role granted by a company to each individual instead of the authentication of individuals based on their universal names as provided by X509 digital ID’s. We depict in this paper an original mechanism for role-...
متن کاملPerformance Evaluation of e-business applications using PNML
This paper proposes the use of XML Petri Nets (PNML), a kind of high-level Petri Nets, for modeling, development, management and performance Web-based systems, e-Activities like e-Business, Business-to-Business (B2B), e-Commerce and mobile applications wireless in the Web or ad-hoc networks. The combination of Petri Nets and XML (Extensible Markup Language) files are emerging as an important ap...
متن کامل