A double access control model for web services based information system

被引:0
作者
Chen, Xueqin [1 ]
Wu, Huizhong [1 ]
Zhu, Yaoqin [1 ]
机构
[1] Nanjing Univ Sci & Tech, Sch Comp Sci & Tech, Lab 603, Nanjing 210094, Peoples R China
来源
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2 | 2008年
关键词
web services; information system; security; access control; functions and resources;
D O I
10.1109/ICSICT.2008.4734715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, distributed computing technologies have developed rapidly, such as web services and other XML-based technologies. Information systems enter into a wide-area distributed computing environment. For web services based information systems, the separation between functions and resources enables reusability. However, it is difficult for traditional Access control models to deal with. The security of system encounters with challenges. This paper proposes a double access control model based on attributes to achieve the access control of system functions and resources. The access control decision of functions depends on subject attributes. The decision of resources relies on three attributes': subject attributes, resources attributes and environments attributes. Consistency of access controls between functions and resources is solved by subject's attributes certificate and shared policy. Certificate proxy is utilized to achieve single sign-on, authenticate and authority in wide-area environment. Furthermore, we depict the process flow of the access control in detail. The proposed model is implemented on XACML.NET package and applied in a web services based information system in NET Environment. At last, the performance of resource access control is analyzed and tested by VSTE-ST 2005. The results of practical application and experiment prove the feasibility and usability of the model.
引用
收藏
页码:1045 / 1050
页数:6
相关论文
共 16 条
  • [1] ANSI, 2004, AM NAT STAND INF TEC
  • [2] DIEGO G, 2005, XACL NET OL
  • [3] Eastlake D., 2002, XML ENCRYPTION SYNTA
  • [4] EASTLAKE D, 2002, XML SIGNATURE SYNTAX
  • [5] ERIC Y, 2005, IEEE INT C WEB SERV
  • [6] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
  • [7] *IBM MICR, 2002, SEC WEB SERV WORLD P
  • [8] LI NH, 2000, DELEGATION LOGIC LOG
  • [9] MA TC, 2004, SECURING MOBILE PROC
  • [10] MARKUS L, 2004, CONCEPTUAL GRID AUTH