Group Membership Authorization Systems
نویسنده
چکیده
In this paper we have tried to show the different group membership authorization systems that are used nowadays or have been proposed for different kinds of applications such as Distributed environment, Grid Computing, ACL and Certificates. The advantages and disadvantages of each of these systems have also been shown in this paper. The main goal of this paper is to compare the different group authorization systems and see their uses.
منابع مشابه
Distributed Authorization with Distributed Grammars
While groups are generally helpful for the definition of authorization policies, their use in distributed systems is not straightforward. This paper describes a design for authorization in distributed systems that treats groups as formal languages. The design supports forms of delegation and negative clauses in authorization policies. It also considers the wish for privacy and efficiency in gro...
متن کاملAuthentication-driven Authorization on Web Access
Unlike in traditional computing environments such as operating systems or databases, the authorized user set, the mode of access, users’ access rights, etc., are not predefined in WWW. In order to assign privileges to authorized but not predefined users in dynamic access environments, we propose an approach called authentication-driven authorization. In this approach, authentication is integrat...
متن کاملSafe Use of Protected Web Resources
This paper focuses on a framework that ensures the safe use of protected Web resources among independent organizations in collaboration. User membership and group membership in each organization are managed independently of other organizations. User authentication and user authorization for a protected resource in one organization is determined by user group membership in other organizations. F...
متن کاملEfficient Verification of Delegation in Distributed Group Membership Management
In ad-hoc networks and other highly distributed and decentralized environments, authorization certificates can be used to control access. Moreover, it is possible to delegate rights listed in the certificate to another users. Several such subsequent delegations build a chain of certificates. Chains of delegation certificates can improve the capability and manageability of systems. Distributed g...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کامل