Authentication-driven Authorization on Web Access
نویسندگان
چکیده
Unlike in traditional computing environments such as operating systems or databases, the authorized user set, the mode of access, users’ access rights, etc., are not predefined in WWW. In order to assign privileges to authorized but not predefined users in dynamic access environments, we propose an approach called authentication-driven authorization. In this approach, authentication is integrated with authorization. The validity of a user is checked by using authentication routines associated with the requested data object. The access permission is achieved by authentication rather than by inheriting from group/role membership relation. A logic-based authorization language has been designed. A prototype has been implemented, which can be used to enforce complex web-based application security policies.
منابع مشابه
User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds
The intention of an authentication and authorization infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO) across or within organizational bound...
متن کاملUsing RDF Metadata To Enable Access Control on the Social Semantic Web
The structure of the Semantic Web gives users the power to share and collaboratively generate decentralized linked data. In many cases, though, collaboration requires some form of authentication and authorization to ensure the security and integrity of the data being generated. Traditional authorization systems that rely on centralized databases are insufficient in this scenario, since they rel...
متن کاملJSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
This specification defines the use of a JSON Web Token (JWT) Bearer Token as a means for requesting an OAuth 2.0 access token as well as for use as a means of client authentication.
متن کاملEnhancing Security in Cloud Computing Using Multilevel Authentication
The proposed work aims to enhance authorization and authentication process by using multilevel authentication to protect cloud from malicious user and unauthorized access, implement security measure to protect data of users stored in cloud environment. It will also provide service level security. Also user based access control is applied over user's data so that user can grant, revoke sharing p...
متن کاملA Policy-driven Approach to Dynamic Composition of Authentication and Authorization Patterns and Services
During the past decade, the telecommunication environment has evolved from single operator featuring voice services to multi-operator featuring a range of different types of services. Services are being provided today in a distributed manner in a connectionless environment requiring cooperation of several components and actors. This paper focuses on the incremental means to ensure access to ser...
متن کامل