An XML-based security architecture for integrating single sign-on and rule-based access control in mobile and ubiquitous web environments

被引:0
作者
Jeong, Jongil [1 ]
Shin, Dongil [1 ]
Shin, Dongkyoo [1 ]
机构
[1] Sejong Univ, Dept Comp Sci & Engn, Kwangjin Ku, 98 Kunja Dong, Seoul 143747, South Korea
来源
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 2, PROCEEDINGS | 2006年 / 4278卷
关键词
single sign-on; SAML; access control; RBAC; XACML; mobile device;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Since mobile and Web applications are integrated, the number of services, a typical mobile user can now access, has greatly increased. With a variety of services, a user will be frequently asked to provide his security information to a system. This iterative request is one critical problem which can cause frequent transmission of user's security information. Another serious problem is how an administrator controls access request of internal users who were authenticated. In order to establish effective security scheme for integrated environments, Single Sign-On and access control also need to be integrated. In this paper, we propose an XML-based architecture integrating authentication and access control policy in integrated environment to be extended to ubiquitous environment. To provide flexibility, extensibility, and interoperability between environments to be integrated, we have implemented an architecture based on SAML and XACML, which are standardized specifications. By specifying security policies in XML schema and exchanging security information according to that schema, the proposed architecture offers the opportunities to build standardized schemes for authentication and authorization. Additionally, the proposed architecture makes it possible to establish a fine-grained access control scheme by specifying the XML element unit as a target to be protected.
引用
收藏
页码:1357 / +
页数:2
相关论文
共 6 条
[1]  
BARKLEY J, 1997, NAT INF SYST SEC C O
[2]  
Ferraiolo D, 1999, ACM T INFORM SYSTEMS, V1
[3]  
HE Q, 2002, P AAMAS 02 DEC FRAUD
[4]  
JEONG J, 2004, LECT NOTES COMPUTER, V3207
[5]  
Parker T. A., 1995, European Convention on Security and Detection (Conf. Publ. No.408), P151, DOI 10.1049/cp:19950488
[6]  
PFITZMANN B, 2002, 3458 IBM RZ