Repository logo

Policy-driven access control for mobile environments

dc.contributor.authorQing, Xuebing
dc.date.accessioned2013-11-07T19:02:55Z
dc.date.available2013-11-07T19:02:55Z
dc.date.created2007
dc.date.issued2007
dc.degree.levelMasters
dc.degree.nameM.Sc.
dc.description.abstractSOA (Service Oriented Architecture) enables interoperability between heterogeneous systems or domains. By complying with proper SOA specifications that are usually XML based, a service provider can provide service to any group of service consumers. A service consumer or requester can ask for a service from any service providers that satisfy its service criteria without knowing any implementation specifications that the service providers adopt. However, a transaction or a set of message exchanges between mutually interactive parties cannot be realized prior to the establishment of a trusted relationship that is embodied in granting or denying access to certain resources under the governance of any involved party. This thesis proposes XACML-based, policy-driven, access-control architecture and a key exchange/authentication framework/protocol at layer 7. The thesis examines a number of authorization and secure-channel establishment issues found not only in a normal service requester-provider environment, but also in an environment that involves mobile requesters. The proposal is derived from a careful study of authorization request/decision rendering procedures in a number of realistic business and leisure scenarios. The scenarios are characterized mainly by (a) the distribution of access control; (b) the indeterminacy of the access control model that is implemented; (c) the distributed storage of policies/organization guidelines/regional laws; (d) the lack of common representations of basic access-control elements such as subject (principle) IDs/resource IDs; and (e) the need to establish secure communication channels over unsecured public networks between security domains. In order to solve these problems, some novel concepts are raised, such as (a) a subject ID mapping service; (b) meta policy server (MPS); (c) reverse authorization; and (d) private reputation server. Furthermore, a peer-to-peer security handshake protocol infrastructure (KEAML/KEAML-KE) at layer 7 and its implementation are presented. Key words. Access control, Authorization in mobile environments, Subject ID mapping, Meta Policy Server, Reverse Authorization, XACML, Key Exchange and Authentication, KEAML/KEAML-KE, Standard security handshake protocol, XML
dc.format.extent155 p.
dc.identifier.citationSource: Masters Abstracts International, Volume: 47-06, page: 3715.
dc.identifier.urihttp://hdl.handle.net/10393/27907
dc.identifier.urihttp://dx.doi.org/10.20381/ruor-18975
dc.language.isoen
dc.publisherUniversity of Ottawa (Canada)
dc.subject.classificationEngineering, Electronics and Electrical.
dc.titlePolicy-driven access control for mobile environments
dc.typeThesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
MR49266.PDF
Size:
2.64 MB
Format:
Adobe Portable Document Format