Supporting heterogeneous middleware security policies in WebCom

نویسندگان

  • Simon N. Foley
  • Barry P. Mulcahy
  • Thomas B. Quillinan
  • Meabh O'Connor
  • John P. Morrison
چکیده

With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. While much work investigating functional interoperability between different middleware architectures has been reported, little practical work has been done on providing a unified and/or interoperable view of security between the different approaches. In this paper we describe how the Secure WebCom distributed architecture provides access control policy interoperability support between a number of middleware security architectures. Secure WebCom uses the KeyNote trust management system to help coordinate the trust relationships between the different middleware systems and their associated access control policies. Middleware authorisation policies can be encoded in terms of cryptographic certificates, and vice-versa. This provides a unified view of access control across heterogeneous middleware systems and also provides the basis for decentralised support of middleware access control policies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Economy-Based Computing with WebCom

Grid environments consist of the volatile integration of discrete heterogeneous resources. The notion of the Grid is to unite different users and organisations and pool their resources into one large computing platform where they can harness, inter-operate, collaborate and interact. If the Grid Community is to achieve this objective, then participants (Users and Organisations) need to be willin...

متن کامل

WebCom-G: Grid Enabled Metacomputing

Current Grid enabling technologies consist of stand-alone architectures. A typical architecture provides middleware access to various services at different hierarchical levels. Services exposed at these levels may be leveraged by the application programmer. However, the level at which the service appears in the hierarchy determines both its richness and the complexity of its use. Thus, benefits...

متن کامل

WebCom Core Information Module

Grid platforms are very promising but are very challenging to use because of their intrinsic heterogeneity in terms of hardware capacities, software environments and system administrator preferences. To avail of the Grid platforms’ advantages easily and efficiently, Grid middlewares are being developed. WebCom-G, based on the WebCom platform, is a grid middleware that hides the complexity of Gr...

متن کامل

The Role of Reflective Middleware in Supporting Flexible Security Policies

Next generation middleware must support applications in the face of increasing diversity in interaction paradigms, end system types and network styles. Therefore, to secure applications, flexible security policies must be configured and indeed reconfigured at runtime. In this paper, we propose an approach combining the openness of reflective middleware with the flexibility of programmable secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. High Speed Networks

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2006