Authentication and Authorization in Server Systems for Bio-Informatics
نویسندگان
چکیده
Authentication and authorization are two tightly coupled and interrelated concepts which are used to keep transactions secure and help in protecting confidential information. This paper proposes to evaluate the current techniques used for authentication and authorization also compares them with the best practices and universally accepted authentication and authorization methods. Authentication verifies user identity and provides reusable credentials while authorization services stores information about user access levels. These mechanisms by which a system checks what level of access a particular authenticated user should have to view secure resources is controlled by the system. Digital signatures and certificate can be used to authenticate the source of messages with the help of tls and ssl which are now an integral part of most web browsers clients and web servers. Digital signature and certificate is one of the frontier approaches which security experts recommend.Bio informatics servers are internet services for sequence analysis and the prediction of aspects of protein structure and function. Users submit protein sequence or alignments the server returns a multiple sequence alignment prosite sequence motifs low complexity regions seg prodom domain assignments nuclear localization signals regions lacking regular structure and predictions of secondary structure solvent accessibility globular regions transmembrane helices coiled coil regions structural switch regions and disulfide bonds. For all services users can submit their query either by electronic mail or interactively from world wide web. Since there would be highly confidential and secure data in certain type of disease research and drug discovery we need an effective authentication and authorization technique to safeguard the interest of the research.
منابع مشابه
Developing Pervasive Trust Paradigm for Authentication and Authorization
Trust plays a growing role in research on security in open computing systems, including Grid computing. We propose using trust for authorization in such systems. Traditionally, authentication and authorization in computer systems guard only user interfaces, thus providing only a perimeter defense against attacks. We search for an authentication and authorization approach that satisfies the requ...
متن کاملSecurity, Authorization, and Authentication for Enterprise Computing
Enterprise computing (EC) is the recognition that to effectively utilize and disseminate information within an entity (university, corporation, government agency, etc.) it will be necessary to design and develop integrated distributed computing environments that allow all types of existing and future systems to interoperate. In EC, there are legacy, COTS, database, and new client/server applica...
متن کاملRFC 4673 RADIUS Dynamic Authorization Server MIB
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes the Remote Authentication Dial-In User Service (RADIUS) (RFC 2865) Dynamic Authorization Server (DAS) functions that support the dynamic authorization extensions as defined in RFC 3576.
متن کاملDesigning a Distributed Authorization Service
We present the design of a distributed authorization service which parallels existing authentication services for distributed systems. Such a service would operate on top of an authentication substrate. There are two distinct ideas underlying our design: (1) The use of a language, called generalized access control list (GACL), as a common representation of authorization requirements. (2) The us...
متن کاملAccessing the Data Security Model in Distributed System
This research deals with the comparative study of distributed system and client/server computer system, placing a special emphasis is on security system. The researches describe the data security in these systems by describing them; examine their issues, challenges and presenting the adequate solutions. We have selected four type of distributed system and included a report on the basis of autho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1001.4136 شماره
صفحات -
تاریخ انتشار 2010