Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer

Enterprise Delegation for Service Based Systems

Enterprise Delegation for Service Based Systems

ISSN : 0974 - 9330
Journal from gdlhub / 2017-08-14 11:52:33
Oleh : Coimbatore Chandersekaran and William R. Simpson, International Journal of Network Security & Its Applications
Dibuat : 2012-06-25, dengan 1 file

Keyword : Credentialing, Authentication, Authorization, Delegation, Attribution, Least Privilege, Public Key Infrastructure, Security Assertion Markup Language (SAML), WS-
Subjek : Enterprise Delegation for Service Based Systems
Url : http://airccse.org/journal/nsa/0511ijnsa10.pdf
Sumber pengambilan dokumen : Internet

Sharing information and maintaining privacy and security is a requirement in distributed


environments. Mitigating threats in a distributed environment requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security. We devise a model that


mitigates a number of threats to the distributed computing pervasive in enterprises. This authentication


process is part of a larger information assurance systemic approach that requires that all active entities


(users, machines and services) be named, and credentialed. Authentication is bi-lateral using PKI


credentialing, and authorization is based upon Security Assertion Markup Language (SAML) attribution


statements. Communication across domains is handled as a federation activity using WS-* protocols. We


present the architectural model, elements of which are currently being tested in an operational


environment. Elements of this architecture include real time computing, edge based distributed mashups,


and dependable, reliable computing. The architecture is also applicable to a private cloud.

Deskripsi Alternatif :

Sharing information and maintaining privacy and security is a requirement in distributed


environments. Mitigating threats in a distributed environment requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security. We devise a model that


mitigates a number of threats to the distributed computing pervasive in enterprises. This authentication


process is part of a larger information assurance systemic approach that requires that all active entities


(users, machines and services) be named, and credentialed. Authentication is bi-lateral using PKI


credentialing, and authorization is based upon Security Assertion Markup Language (SAML) attribution


statements. Communication across domains is handled as a federation activity using WS-* protocols. We


present the architectural model, elements of which are currently being tested in an operational


environment. Elements of this architecture include real time computing, edge based distributed mashups,


and dependable, reliable computing. The architecture is also applicable to a private cloud.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiInternational Journal of Network Security & Its Applications
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • , Editor: fachruddin

Download...

  • Download hanya untuk member.

    Jurnal 56
    Download Image
    File : Jurnal 56.PDF

    (3497815 bytes)