Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer
Enterprise Delegation for Service Based Systems
Enterprise Delegation for Service Based Systems
ISSN : 0974 - 9330Journal from gdlhub / 2017-08-14 11:52:33
Oleh : Coimbatore Chandersekaran and William R. Simpson, International Journal of Network Security & Its Applications
Dibuat : 2012-06-25, dengan 1 file
Keyword : Credentialing, Authentication, Authorization, Delegation, Attribution, Least Privilege, Public Key Infrastructure, Security Assertion Markup Language (SAML), WS-
Subjek : Enterprise Delegation for Service Based Systems
Url : http://airccse.org/journal/nsa/0511ijnsa10.pdf
Sumber pengambilan dokumen : Internet
Sharing information and maintaining privacy and security is a requirement in distributed
environments. Mitigating threats in a distributed environment requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security. We devise a model that
mitigates a number of threats to the distributed computing pervasive in enterprises. This authentication
process is part of a larger information assurance systemic approach that requires that all active entities
(users, machines and services) be named, and credentialed. Authentication is bi-lateral using PKI
credentialing, and authorization is based upon Security Assertion Markup Language (SAML) attribution
statements. Communication across domains is handled as a federation activity using WS-* protocols. We
present the architectural model, elements of which are currently being tested in an operational
environment. Elements of this architecture include real time computing, edge based distributed mashups,
and dependable, reliable computing. The architecture is also applicable to a private cloud.
Sharing information and maintaining privacy and security is a requirement in distributed
environments. Mitigating threats in a distributed environment requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security. We devise a model that
mitigates a number of threats to the distributed computing pervasive in enterprises. This authentication
process is part of a larger information assurance systemic approach that requires that all active entities
(users, machines and services) be named, and credentialed. Authentication is bi-lateral using PKI
credentialing, and authorization is based upon Security Assertion Markup Language (SAML) attribution
statements. Communication across domains is handled as a federation activity using WS-* protocols. We
present the architectural model, elements of which are currently being tested in an operational
environment. Elements of this architecture include real time computing, edge based distributed mashups,
and dependable, reliable computing. The architecture is also applicable to a private cloud.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | International Journal of Network Security & Its Applications |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: fachruddin
Download...
Download hanya untuk member.
Jurnal 56
File : Jurnal 56.PDF
(3497815 bytes)