Policy-driven access control for mobile environments
| dc.contributor.author | Qing, Xuebing | |
| dc.date.accessioned | 2013-11-07T19:02:55Z | |
| dc.date.available | 2013-11-07T19:02:55Z | |
| dc.date.created | 2007 | |
| dc.date.issued | 2007 | |
| dc.degree.level | Masters | |
| dc.degree.name | M.Sc. | |
| dc.description.abstract | SOA (Service Oriented Architecture) enables interoperability between heterogeneous systems or domains. By complying with proper SOA specifications that are usually XML based, a service provider can provide service to any group of service consumers. A service consumer or requester can ask for a service from any service providers that satisfy its service criteria without knowing any implementation specifications that the service providers adopt. However, a transaction or a set of message exchanges between mutually interactive parties cannot be realized prior to the establishment of a trusted relationship that is embodied in granting or denying access to certain resources under the governance of any involved party. This thesis proposes XACML-based, policy-driven, access-control architecture and a key exchange/authentication framework/protocol at layer 7. The thesis examines a number of authorization and secure-channel establishment issues found not only in a normal service requester-provider environment, but also in an environment that involves mobile requesters. The proposal is derived from a careful study of authorization request/decision rendering procedures in a number of realistic business and leisure scenarios. The scenarios are characterized mainly by (a) the distribution of access control; (b) the indeterminacy of the access control model that is implemented; (c) the distributed storage of policies/organization guidelines/regional laws; (d) the lack of common representations of basic access-control elements such as subject (principle) IDs/resource IDs; and (e) the need to establish secure communication channels over unsecured public networks between security domains. In order to solve these problems, some novel concepts are raised, such as (a) a subject ID mapping service; (b) meta policy server (MPS); (c) reverse authorization; and (d) private reputation server. Furthermore, a peer-to-peer security handshake protocol infrastructure (KEAML/KEAML-KE) at layer 7 and its implementation are presented. Key words. Access control, Authorization in mobile environments, Subject ID mapping, Meta Policy Server, Reverse Authorization, XACML, Key Exchange and Authentication, KEAML/KEAML-KE, Standard security handshake protocol, XML | |
| dc.format.extent | 155 p. | |
| dc.identifier.citation | Source: Masters Abstracts International, Volume: 47-06, page: 3715. | |
| dc.identifier.uri | http://hdl.handle.net/10393/27907 | |
| dc.identifier.uri | http://dx.doi.org/10.20381/ruor-18975 | |
| dc.language.iso | en | |
| dc.publisher | University of Ottawa (Canada) | |
| dc.subject.classification | Engineering, Electronics and Electrical. | |
| dc.title | Policy-driven access control for mobile environments | |
| dc.type | Thesis |
Files
Original bundle
1 - 1 of 1
