A Decentralized Authorization Mechanism for E-Business Applications

نویسنده

  • Zoltán Miklós
چکیده

E-business applications need robust and powerful mechanisms to authorize security-critical actions. This actions can be very complex, since they can be initiated not only by human users but also by applications or software agents. Existing authorization mechanisms do not scale for large number of users if the trust relations are dynamic and fail to provide reliable authorization among strangers. Our mechanism uses authorization relevant attributes to define the policy. The attributes are assigned to principals in a decentralized manner. We also present a method to reduce the financial losses which may arise if the authorization mechanism fails. We conclude the paper with our plans for future research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Policy Based Framework for Trust Management and Evolution of Peer to Peer Groups

Peer to peer collaborative groups are becoming increasingly popular for collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games. The decentralized nature of these groups gives rise to the need of a secure group layer which integrates authentication, admission control, authorization, access control and key management. ...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting

Providing network infrastructure for authenti-cation, authorization and accounting (AAA) functionalities required by inter-enterprise business applications operating over the global Internet is a challenging problem. The infrastructure needs to support large numbers of clients and services, and also to provide secure resources sharing between applications and across organizations. This paper de...

متن کامل

Inter-domain authorization and delegation for business-to-business e-commerce

Security exposures are viewed as a major impediment to the growth of electronic commerce over Internet. The main requirement of inter-enterprise communications is the verification of the role granted by a company to each individual instead of the authentication of individuals based on their universal names as provided by X509 digital ID’s. We depict in this paper an original mechanism for role-...

متن کامل

Performance Evaluation of e-business applications using PNML

This paper proposes the use of XML Petri Nets (PNML), a kind of high-level Petri Nets, for modeling, development, management and performance Web-based systems, e-Activities like e-Business, Business-to-Business (B2B), e-Commerce and mobile applications wireless in the Web or ad-hoc networks. The combination of Petri Nets and XML (Extensible Markup Language) files are emerging as an important ap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002