نتایج جستجو برای: authorization propagation

تعداد نتایج: 115609  

Journal: :Int. J. Web Service Res. 2005
Sarath Indrakanti Vijay Varadharajan Michael Hitchens

In this paper, we discuss the design issues for an authorization framework for Web Services. In particular, we describe the features required for an authorization policy language for Web Services. We briefly introduce the authorization service provided by Microsoft .NET MyServices and describe our extended authorization model that proposes extensions to the .NET MyServices authorization service...

2011
Steffen Bartsch

Authorization is a key aspect in secure software development of multi-user applications. Authorization is often enforced in the program code with enforcement statements. Since authorization is present in numerous places, defects in the enforcement are difficult to discover. One approach to this challenge is to improve the developer usability with regard to authorization. We analyze how software...

2007
Wei Zhou Christoph Meinel

In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its corresponding enforcing mechanism. In a root policy, the involved users and resources can be defined in coarse or finegrained. Each involved authorization policy’s storage, trust management and enforcement can be defined...

2015
Owen Arden Jed Liu Andrew C. Myers

Because information flow control mechanisms often rely on an underlying authorization mechanism, their security guarantees can be subverted by weaknesses in authorization. Conversely, the security of authorization can be subverted by information flows that leak information or that influence how authority is delegated between principals. We argue that interactions between information flow and au...

2015
Pranab Das Abhinav Das David F Ferraiolo Ravi Sandhu Serban Gavrila D Richard Kuhn Eric Yuan Jin Tong Shucheng Yu Cong Wang Kui Ren Wenjing Lou Martin Gaedke Johannes Meinecke Martin Nussbaumer Markus Lorch Seth Proctor Rebekah Lepro Dennis Kafura Sumit Shah Nurzhan Nurseitov Michael Paulson Randall Reynolds Paulo Trezentos Jaehong Park Erich Gamma Richard Helm Ralph Johnson

Absence of architecture to describe how to implement authorization as a centralized service, in a way similar to authentication , has been causing redundant deployment of computing resources, lack of standard practices, and never-ending learning curve in maintaining proprietary or ad hoc authorization solutions. The paper develops an architecture, which focuses on centralization of authorizatio...

2012
Jinwei Hu Khaled M. Khan Yun Bai Yan Zhang

Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this defini...

2001
Ramaswamy Chandramouli

In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tables. These frameworks cannot provide the foundation for supporting multiple types of authorizations like Emergency Authorizations, Context-based Authorizations etc, which are required in many vertical market systems li...

2003
Rebekah Lepro

Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functio...

2007
Jiangnan Qiu Jiang Tian Yanzhang Wang

Firstly considering the problems in e-government authorization model, we analyze the features of government business process. Then an innerorganization authorization model based on organization is proposed. Then based on the proposed model, an authorization model for inter-organizational business process collaboration is designed. This model can resolve the problem of separating organization an...

2004
Wu Liu Jianping Wu Hai-Xin Duan Xing Li Ping Ren

This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-grained authorization of job and resource management requested in the Grid environment which meets the Fusion-Grid’s security needs in large scale networks such as CERNET. It integrates the GT2 job manager and X.509 authoriza...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید