Implementing a Secure Annotation Service
نویسندگان
چکیده
Annotation systems enable “value-adding” to digital resources by the attachment of additional data in the form of comments, explanations, references, reviews, corrections and other types of external, subjective remarks. They facilitate group discourse and capture collective intelligence by enabling communities to attach and share their views on particular data and documents accessible over the Web. Annotation systems vary greatly with regard to the types of content they annotate, the extent of collaboration and sharing they allow and the communities which they serve. However within many applications, there is a need to restrict access to the annotations to a particular group of trusted users in order to protect intellectual property rights or personal privacy. This paper describes a secure, open source annotation system that we have developed that uses Shibboleth and XACML to identify and authenticate users and restrict their access to annotations stored on an Annotea server.
منابع مشابه
Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture
This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...
متن کاملService Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assaults. Business partners want to know that the business did enough to protect the information goods. The Web Service is the perfect blue print for the agile business environment due to loose in nature, flexibility re-usa...
متن کاملUsing the Workflow Technology in Secure Software Engineering Education
Security has become an increasingly important topic in software engineering. In this paper, an approach of using the workflow technology in teaching secure software engineering courses is presented. This approach can free students from lowlevel tools manipulation and command line interactions so that students can focus on learning the important secure software principles. Four case studies usin...
متن کاملSecure and Efficient Asynchronous Broadcast Protocols
Reliable broadcast protocols are a fundamental building block for implementing replication in fault-tolerant distributed systems. This paper addresses secure service replication in an asynchronous environment with a static set of servers, where a malicious adversary may corrupt up to a threshold of servers and controls the network. We develop a formal model using concepts from modern cryptograp...
متن کاملBiosphere: the interoperation of web services in microarray cluster analysis.
UNLABELLED The growing use of DNA microarrays in biomedical research has led to the proliferation of analysis tools. These software programs address different aspects of analysis (e.g. normalisation and clustering within and across individual arrays) as well as extended analysis methods (e.g. clustering, annotation and mining of multiple datasets). Therefore, microarray data analysis typically ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006