A trusted decentralized access control framework for the client/server architecture

نویسندگان

  • Weili Han
  • Min Xu
  • Weidong Zhao
  • Guofu Li
چکیده

This paper proposes a trusted decentralized access control (TDAC) framework for the client/server architecture. As the fundamental principle, TDAC enforces access control policies at the client side and protects sensitive objects at the server side by leveraging trusted computing technologies. Compared with the previous work of Sandhu and Zhang (2005), TDAC uses fewer requirements for trusted components. To implement TDAC, we design a private trusted reference monitor that runs at the client side, evaluates an access control request, and signs a temporary access control credential for a client application trustworthily; we also design a master reference monitor that runs at the server side, evaluates the request from the client application only according to the temporary access control credential. As a typical application, TDAC can protect client’s private context data in subject-context aware access control. & 2009 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response

Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents are a decentralized and flexible technology to leverage this potential. While mobile agent platforms suffer from a greater variety of security risks than the classic client-server approach, Trusted Computing is capable of alleviating these problems. Unfortunately, Remote ...

متن کامل

Client-side access control enforcement using trusted computing and PEI models

It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard trusted computing technologies promises a revolution in this respect by providing roots of trust upon which secure applications can be developed. These technologies offer a particularly attractive platform for securit...

متن کامل

mTrigger: An Event-based Framework for Location-based Mobile Triggers

Location-based triggers are the fundamental capability for supporting location-based advertisements, location-based entertainment applications, personal reminders, as well as presence-based information sharing applications. In this chapter, we describe the design and the implementation of mTrigger, an event-based framework for scalable processing of location-based mobile triggers (location trig...

متن کامل

MPEG-4 broadcast: a client/server framework for multi-service streaming using push channels

This paper presents the architecture and implementation of a multi-service streaming system for broadcast of MPEG4 elementary streams. The proposed system promotes the use of the push channel model for information distribution [1]. The system architecture accommodates two main layers for broadcast service management and media delivery. The broadcast service management layer uses the publisher-s...

متن کامل

Replicated Secure Shared Objects for Groupware Applications

This report describes the design and implementation of a secure shared replicated objects system, intended for use by groupware application programmers. The system enables such programmers to incorporate conceptually shared objects into their programs in order to provide the users with access to shared information. Access to each object is restricted to trusted parties by applying access contro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 33  شماره 

صفحات  -

تاریخ انتشار 2010