Cross-domain Attribute Conversion for Authentication and Authorization

被引:0
作者
Thaler, Stefan [1 ]
den Hartog, Jerry [1 ]
Ayed, Dhouha [2 ]
Sommer, Dieter [3 ]
Hitchens, Michael [4 ]
机构
[1] Tech Univ Eindhoven, Eindhoven, Netherlands
[2] Theresis Lab Thales, Massy, France
[3] IBM Res, Zurich, Switzerland
[4] Macquarie Univ, Sydney, NSW, Australia
来源
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015 | 2015年
关键词
D O I
10.1109/ARES.2015.41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In bio-security emergencies, such as an outbreak of an exotic animal disease, it is essential that the organizations involved in combating this outbreak collaborate effectively and efficiently. To achieve such a collaboration potentially confidential infrastructure and resources need to be shared amongst members of the participating organizations. In AU2EU we demonstrate the combination of existing data minimizing authentication, attribute-based authorization technologies to dynamically enable collaborations between these organization. However, a key problem that occurs during the establishment of such collaboration is different terminologies for similar authorization attributes. To overcome these differences and to minimize the overhead for new organizations to join an existing consortium we propose an ontology-based solution for converting attributes from one domain vocabulary to another. Additionally, we propose a methodology to construct a shared domain vocabulary. Using a shared domain vocabulary in the conversion process decreases the amount of alignments required for collaborating. We integrate and demonstrate the feasibility of this approach in a real-life scenario within the scope of AU2EU. This paper presents preliminary work, which is currently being deployed and will be evaluated in the upcoming months.
引用
收藏
页码:652 / 659
页数:8
相关论文
共 26 条
  • [1] [Anonymous], 2007, P 8 AI IA TABOO JOIN
  • [2] [Anonymous], 2013, EXTENSIBLE ACC CONTR
  • [3] [Anonymous], 1998, WORDNET
  • [4] Ardagna Claudio A., 2010, Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010), P1090, DOI 10.1109/CIT.2010.199
  • [5] Ayed Dhouha, 2014, Trust and Trustworthy Computing. 7th International Conference, TRUST 2014. Proceedings: LNCS 8564, P179, DOI 10.1007/978-3-319-08593-7_12
  • [6] DBpedia - A crystallization point for the Web of Data
    Bizer, Christian
    Lehmann, Jens
    Kobilarov, Georgi
    Auer, Soeren
    Becker, Christian
    Cyganiak, Richard
    Hellmann, Sebastian
    [J]. JOURNAL OF WEB SEMANTICS, 2009, 7 (03): : 154 - 165
  • [7] Böhm Klemens, 2010, J. theor. appl. electron. commer. res., V5, P77, DOI 10.4067/S0718-18762010000200006
  • [8] Brands S., 2000, Rethinking public key infrastructures and digital certificates: building in privacy
  • [9] Brickley D, 2014, RDF SCHEMA 11 W3C RE
  • [10] Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93