Abstract
The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces a multilayer authentication and authorization. Actor’s privileges are the result of the user’s and the system’s roles conjunction with the network zone. Unlike common systems, the privileges are given to a digital identity, not to particular accounts, so that it does not matter which account was used by the user – he will get the same privileges. Such a combination of many smaller ideas and methods results in a new and modern approach to the security aspects of the distributed service oriented systems.
Authors (2)
Cite as
Full text
- Publication version
- Accepted or Published Version
- License
- Copyright (Wydział ETI Politechniki Gdańskiej 2010)
Keywords
Details
- Category:
- Articles
- Type:
- artykuły w czasopismach recenzowanych i innych wydawnictwach ciągłych
- Published in:
-
Zeszyty Naukowe Wydziału ETI Politechniki Gdańskiej. Technologie Informacyjne
no. 18,
pages 217 - 222,
ISSN: 1732-1166 - Language:
- English
- Publication year:
- 2010
- Bibliographic description:
- Lubomski P., Krawczyk H.: Generalized access control in hierarchical computer network// Zeszyty Naukowe Wydziału ETI Politechniki Gdańskiej. Technologie Informacyjne. -Vol. 18., (2010), s.217-222
- Bibliography: test
-
- Erl T.: SOA Principles and Service Design, SOA Systems Inc., 2008.
- Mather T., Kumaraswamy S., Latif S.: Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O'Reilly, 2009.
- Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R.: The NIST Model for Role-Based Access Control: Toward a Unified Standard, 5th ACM Workshop Role-Based Access Control, July 2000, pp. 47- 63. open in new tab
- Krawczyk H., Lubomski P.: Architektury systemów informatycznych wspomagających rozwój e- uczelni, Zeszyty naukowe WETI PG, seria Technologie Informacyjne, 2009, pp.143-150.
- Zimmermann H.: OSI Reference Model-The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol. 28, no. 4, April 1980, pp. 425-432 open in new tab
- Lehtinen R., Gangemi Sr. G.T.: Computer Security Basics, Second Edition, O'Reilly, 2006. open in new tab
- Windley P.J.: Digital Identity, O'Reilly, 2005. open in new tab
- Maamar Z., Benslimane D., Narendra N.C.: What can Context do for Web Services? Communications of the ACM, December 2006, pp. 98-103. open in new tab
- Maglio P.P., Srinivasan S., Keulen J.T., Spohrer J.: Service Systems, Service Scientists, SSME and Innovation, Communications of the ACM, July 2006, pp. 81-85. open in new tab
- Verified by:
- Gdańsk University of Technology
seen 66 times