Developing Pervasive Trust Paradigm for Authentication and Authorization
نویسندگان
چکیده
Trust plays a growing role in research on security in open computing systems, including Grid computing. We propose using trust for authorization in such systems. Traditionally, authentication and authorization in computer systems guard only user interfaces, thus providing only a perimeter defense against attacks. We search for an authentication and authorization approach that satisfies the requirements of defense in depth. After reviewing and classifying a variety of security paradigms, we propose the paradigm of Pervasive Trust. It is analogous to a social model of interaction, where trust is constantly —if often unconsciously— applied. In an initial study, we investigated using our trust paradigm as the solid conceptual basis for the perimeter-defense authorization solution developed in our lab: a trust-enhanced role-mapping server. The server improves role-based access control mechanisms by providing and managing trust ratings for users.
منابع مشابه
Architecting Adaptable Security Infrastructures for Pervasive Networks through Components
Security management in pervasive networks should be fundamentally flexible. The dynamic and heterogeneous character of these environments requires a security infrastructure which can be tailored to different operating conditions, at variable levels of granularity, during phases of design, deployment, and execution. This is possible with component-based security architecture. We illustrate the b...
متن کاملTowards a localisation of trust framework for pervasive environments
Pervasive computing envisions an environment in which we are surrounded by many embedded computer devices. The existence of those networked devices provides us with a mobile, spontaneous and dynamic way to access various resources provided by different (security policy) domains. In recent years, we have witnessed the evolutionary development of numerous multiple domain applications. One of the ...
متن کاملÆTHER: an Authorization Management Architecture for Ubiquitous Computing
The ubiquitous computing paradigm suggests that we are going to be surrounded by countless wireless devices capable of providing services transparently. By definition, the nature of ubiquitous computing environments is open and extremely dynamic, making difficult the establishment of predefined security relationships between all of the participating entities. Authentication mechanisms can be em...
متن کاملTrustworthiness in Pervasive and Ubiquitous Environment
The technology needed to realize the goal of fully pervasive and mobile computing is rapidly coming together. Its emergence represents an unprecedented opportunity to expand the power of the Internet beyond traditional computing devices, enabling a world of smart spaces and smart appliances providing often invisible support for a variety of context-aware services with tremendous environmental a...
متن کاملTrust Enhanced Authorization for Distributed Systems
The trust –management approach to distributed system security is developed as an answer to the inadequacy of traditional authorization mechanism. The subjective concept of trust not only enables users to better understand the paradigm of pervasive computing, but also opens new direction of research for solving existing problems such as security [8], management of online communities or e-service...
متن کامل