A service-oriented approach to security - Concepts and issues

被引:4
作者
Bertino, Elisa [1 ]
Martino, Lorenzo D. [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
来源
EIGHTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS | 2007年
关键词
D O I
10.1109/ISADS.2007.7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various mechanisms for authentication and access control have been developed over time. Operating systems and DBMS implement such mechanisms and support quite rich access control models. A major limitation, however, of such mechanisms is that they are not extensible; thus whenever an application domain requires more sophisticated access controls or authentication, the applications must include logics for such controls. Such an approach leads to increased costs in application development and maintenance. For these reasons, models and mechanisms apt to separate those functions have emerged, also fostered by XML and Web services. At the same time, the need to drive the behaviour of security through clearly stated and machine-processable policies has fostered the development of various policy models and policy management mechanisms. A policy-based approach enhances flexibility, and reduces the application development costs. Changes to the access control or authentication requirements simply entail modifying the policies, without requiring changes to the applications. It is thus clear that an important approach to the problem of security is represented by the development of policy-based security services providing all functions for security management relevant to applications. Such an approach is particularly promising for applications organized according to the Service Oriented (SOA) paradigm. In this paper we discuss basic concepts of such an approach to security and we present a reference architectural framework. We discuss three relevant classes of security services, namely digital identity management services, authentication services, access control services, and outline research directions for each such class.
引用
收藏
页码:7 / +
页数:2
相关论文
共 7 条
  • [1] Database security - Concepts, approaches, and challenges
    Bertino, E
    Sandhu, R
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (01) : 2 - 19
  • [2] KOGLIN Y, IN PRESS IEEE T PARA
  • [3] NIBLETT P, 2005, IBM SYSTEM J, V44
  • [4] *OAS, 2006, WEB SERV BROK NOT
  • [5] *OAS STAND, 2003, ASS PROT OAS SEC ASS
  • [6] Sandhu R., 1996, IEEE Computer, V29, P38
  • [7] SQUICCIARINI AC, 2006, UNPUB AUTH SL SYSTEM