Abstract interdomain security assertions: A basis for extra-grid virtual organizations

被引:8
作者
Carpenter, BE
Janson, PA
机构
[1] IBM Switzerland, CH-1211 Geneva 2, Switzerland
[2] IBM Corp, Zurich Res Lab, CH-8803 Ruschlikon, Switzerland
关键词
D O I
10.1147/sj.434.0689
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One significant challenge in building grids between organizations with heterogeneous security systems is the need to express and enforce security policies that specify the users in one organization (the source domain) who are allowed to access the resources in another organization (the target domain). This requires linking the syntax and semantics of security assertions referring to users and their attributes in the source domain to those referring to resources in the target domain. This paper suggests some basic requirements for solving this problem, in particular, an abstract form of interdomain security assertion (IDSA) relying, for instance, on globally meaningful URIs (Uniform Resource Identifiers) to refer to users, resources, and their attributes. This canonical abstract form of IDSA is, however, used strictly for assertion mapping purposes. It may- but need not-be visible in any concrete security assertion syntax in any domain. The paper further suggests different scenarios in which URIs for users, resources, and attributes defined in one domain can be mapped to semantically meaningful references-with varying degrees of granularity and accountability-in another domain where they would otherwise be meaningless.
引用
收藏
页码:689 / 701
页数:13
相关论文
共 16 条
[1]  
[Anonymous], 1994, Distributed Open Systems
[2]  
ATKINSON B, 2002, WEB SERVICES SECURIT
[3]  
BAKER R, 2003, CONCEPTUAL GRID AUTH
[4]  
DIVIMERCATI SD, 1996, P 1996 WORKSH NEW SE, P87
[5]  
FARRELL S, 2002, ASSERTIONS PROTOCOLS
[6]  
FOSTER I, 2002, 5 OP GRID SERV INFR
[7]  
GREENWALD S, 1996, P 1996 WORKSH NEW SE, P74
[8]  
*INT ENG TASK FORC, 2002, INT X 509 PUBL KEY I
[9]  
Kindred D, 2001, DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, P254, DOI 10.1109/DISCEX.2001.932220
[10]  
Kohl J., 1993, KERBEROS NETWORK AUT