A Secure Access Control Mechanism Web Service-based in Extended Organization PKI Networks
نویسندگان
چکیده
Organizations use PKI (Public Key Infrastructures) to support internal business processes, but some businesses have industrial partnerships with others, and these alliances can exploit B2B (Business to Business) e-commerce capabilities by connecting corporate PKI. The paper deals with two methods to realize access control in extended organization PKI business processes: BCAs (Bridge Certification Authority) create a combined multi-enterprise PKI at the cost of increased complexity when evaluating the acceptability of certificates. But today’s COTS (Commercial Off-The-Shelf) products are not entirely prepared to meet the challenges of bridge-connected PKIs. The paper focuses on designing a secure access control mechanism in extended organization PKI networks based on web service. The secure access control mechanism has integrated the role-based access control in X.509v4 PMI (Privilege Management Infrastructure) with the XML (Extensible Markup Language) security solution. The paper proposes the access control mechanism and realization technology in details, and some measures to improve the system’s running efficiency are suggested.
منابع مشابه
Secure Information Sharing Using Attribute Certificates and Role Based Access Control
In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...
متن کاملEnabling Secure Service Discovery with Attribute Based Encryption
This paper concentrates on providing a scalable solution for securing the service discovery mechanisms deployed in dynamic and self-organizing systems like those found in ubiquitous computing or semantic web based scenarios. Service discovery is rendered necessary when clients need to locate services they can describe but that they do not necessarily know, thereby rendering PKI based solutions,...
متن کاملImage flip CAPTCHA
The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...
متن کاملEfficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks
Device authentication can reinforce the security of the home network services by ensuring that only specific authorized devices by specific authorized users can access the services. And it is also a mandatory technology for context-aware services in which users are not participant in the service flow. In this paper, we propose a device authentication and access control scheme based on two-layer...
متن کاملA Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial
IBE, secure messaging, RBAC, access control, health care, security, privacy The management of confidential and sensitive information is a major problem for people and organisations. Dynamic organisations require secure solutions to protect confidential documents against unauthorised access and to cope with changes to people's roles and permissions. Solutions based on traditional cryptographic s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005