Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies

نویسندگان

  • Marianne Winslett
  • Neil Ching
  • Vicki Ellen Jones
  • Igor Slepchin
چکیده

Often an information source on the Web would like to provide diierent classes of service to diierent clients. In the autonomous, highly distributed world of the Web, the traditional approach of using authentica-tion to diierentiate between classes of clients is no longer suucient, as knowledge of a client's identity will often not suuce to determine whether a client is authorized to use a service. In CJW96] we proposed the use of digital credentials to help solve this problem; but their use will in turn introduce a bevy of new problems associated with credential management. In this paper we propose the use of server security policies and client credential submission policies to aid in the management of a client's digital credentials. We propose a structure for such policies, and brieey describe an implementation of personal security assistants and server security assistants that embodies our proposed approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

Tamper-resistant ubiquitous data management

The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms ...

متن کامل

Secure Business Application Logic for e-Commerce Systems

The major reason why most people are still sceptical about e-commerce is the perceived security and privacy risks associated with e-transactions, e.g., data, smart cards, credit cards and exchange of business information by means of online transactions. Today, vendors of e-commerce systems have relied solely on secure transaction protocols such as SSL, while ignoring the security of server and ...

متن کامل

Programmable SSL Interface and Its Application in Data Management with Multi-Layered Security Policy

This paper presents an interface for secure data transfer between a web server and a client. It uses Secure Socket Layer (SSL) protocol to encrypt/decrypt the data that travel through the networks. The system administrators can select the cipher suites so that they can impose different security policy for different users. There is a cryptographic module in the web server of an application syste...

متن کامل

End-to-End Web Application Security

Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the client and server must collaborate to achieve security goals, to eliminate common security exploits, and to secure the emerging class of rich, crossdomain Web applications referred to as Web 2.0. In order to support en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997