Knowledge Resource Center for Ecological Environment in Arid Area
DOI | 10.1002/spe.511 |
Access control and trust in the use of widely distributed services | |
Bacon, J; Moody, K; Yao, W | |
通讯作者 | Bacon, J |
来源期刊 | SOFTWARE-PRACTICE & EXPERIENCE
![]() |
ISSN | 0038-0644 |
EISSN | 1097-024X |
出版年 | 2003 |
卷号 | 33期号:4页码:375-394 |
英文摘要 | OASIS is a role-based access control (RRAC) architecture for achieving secure interoperation of independently managed services in an open, distributed environment. OASIS differs from other RBAC schemes in a number of ways: role management is decentralized, roles are parametrized, roles are activated within sessions and privileges are not delegated. OASIS depends on an active middleware platform to notify services of any relevant changes in their environment.. Services define roles and establish formally specified policy for role activation and service use (authorization); users must present the required credentials and satisfy specified constraints in order to activate a role or invoke a service. The membership rule of a role indicates which of the role activation conditions must remain true while the role is active. A role is deactivated immediately if any of the conditions of the membership rule associated with its activation become false. OASIS introduces the notion of appointment, whereby being active in certain roles carries the privilege of issuing appointment certificates to other users. Appointment certificates capture the notion of long-lived credentials such as academic and professional qualification or membership of an organization. The role activation conditions of a service may include appointment certificates, prerequisite roles and environmental constraints. The role activation and authorization policies of services within an administrative domain need not embody role hierarchies nor enforce privilege delegation. But OASIS is sufficiently flexible to capture such notions, through prerequisite roles and appointments, if they are required within an application domain. We define the model and architecture and discuss engineering details, including security issues. We illustrate how an OASIS session can span multiple domains and we propose a minimal infrastructure to enable widely distributed, independently developed services to enter into agreements to respect each other’s credentials. In a multi-domain system access control policy may come from multiple sources and must be expressed, enforced and managed. In order to respond to changing relationships between organizations it should be easy to allow role holders in one domain to obtain privileges in another. Our approach to policy and meta-policy management is described. We speculate on a further extension to mutually unknown, and therefore untrusted, parties. Each party will accumulate audit certificates which embody its interaction history and which may form the basis of a web of trust Copyright (C) 2003 John Wiley Sons, Ltd. |
英文关键词 | security role-based access control policy trust certificates |
类型 | Article |
语种 | 英语 |
国家 | England |
收录类别 | SCI-E |
WOS记录号 | WOS:000181843300005 |
WOS关键词 | POLICY |
WOS类目 | Computer Science, Software Engineering |
WOS研究方向 | Computer Science |
资源类型 | 期刊论文 |
条目标识符 | http://119.78.100.177/qdio/handle/2XILL650/145859 |
作者单位 | (1)Univ Cambridge, Comp Lab, Cambridge CB3 0FD, England |
推荐引用方式 GB/T 7714 | Bacon, J,Moody, K,Yao, W. Access control and trust in the use of widely distributed services[J],2003,33(4):375-394. |
APA | Bacon, J,Moody, K,&Yao, W.(2003).Access control and trust in the use of widely distributed services.SOFTWARE-PRACTICE & EXPERIENCE,33(4),375-394. |
MLA | Bacon, J,et al."Access control and trust in the use of widely distributed services".SOFTWARE-PRACTICE & EXPERIENCE 33.4(2003):375-394. |
条目包含的文件 | 条目无相关文件。 |
个性服务 |
推荐该条目 |
保存到收藏夹 |
导出为Endnote文件 |
谷歌学术 |
谷歌学术中相似的文章 |
[Bacon, J]的文章 |
[Moody, K]的文章 |
[Yao, W]的文章 |
百度学术 |
百度学术中相似的文章 |
[Bacon, J]的文章 |
[Moody, K]的文章 |
[Yao, W]的文章 |
必应学术 |
必应学术中相似的文章 |
[Bacon, J]的文章 |
[Moody, K]的文章 |
[Yao, W]的文章 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。