Authentication and authorization infrastructures (AAIs): a comparative survey

نویسندگان

  • Javier López
  • Rolf Oppliger
  • Günther Pernul
چکیده

In this article, we argue that traditional approaches for authorization and access control in computer systems (i.e., discretionary, mandatory, and role-based access controls) are not appropriate to address the requirements of networked or distributed systems, and that proper authorization and access control requires infrastructural support in one way or another. This support can be provided, for example, by an authentication and authorization infrastructure (AAI). Against this background, we overview, analyze, discuss, and put into perspective some technologies that can be used to build and operate AAIs. More specifically, we address Microsoft .NET Passport and some related activities (e.g. the Liberty Alliance Project), Kerberos-based solutions, and AAIs that are based on digital certificates and public key infrastructures (PKIs). We conclude with the observation that there is no single best approach for providing an AAI, that every approach has specific advantages and disadvantages, and that a comprehensive AAI must combine various technologies and approaches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments

Authentication and Authorisation Infrastructures (AAIs) support service providers on the Internet in outsourcing security services. AAIs influence and change the process of e-commerce transactions on multiple points. Changes influence users, service providers, and provider federations likewise. This work analyses the alterations implied by an AAI, comparing various AAI paradigms and traditional...

متن کامل

Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project

Authentication and Authorization Infrastructures (AAIs) are single sign-on systems. Their purpose is authenticating a user once, i.e. locally at the user’s so-called home organization, and then checking authorization of requested resource accesses based on user attributes the user’s home organization delivers. AAIs are just about being widely employed, and Switzerland is playing a pioneering ro...

متن کامل

Towards a Risk Management Perspective on AAIs

Authentication and Authorisation Infrastructures (AAIs) support service providers on the internet to outsource security services. Motivations for their usage stem from software engineering and economics. For the latter an assessment of inherent risks is needed. In this work the authors deduct an appropriate, formalistic risk assessment method for AAIs and analyse outsource able security service...

متن کامل

Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies

In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authentication and authorization infrastructures (AAIs). However, specification and maintenance of ABAC policies has turned out to be complex and error-prone even in federations of limited size, especially if heterogeneous attribute schem...

متن کامل

Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures

Attribute-based access control (ABAC) is a very powerful and flexible security technique making it possible to overcome limitations of traditional role-based and discretionary access controls. ABAC enables the dynamic handling of vast numbers of heterogeneous and changing resources and users, a task especially relevant for E-Commerce or distributed computing. With an authentication and authoris...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2004