Authorization-Based Access Control for the Services Oriented Architecture
Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 167 |
---|---|
container_issue | |
container_start_page | 160 |
container_title | |
container_volume | |
creator | Karp, A.H. |
description | Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture |
doi_str_mv | 10.1109/C5.2006.9 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4019390</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4019390</ieee_id><sourcerecordid>4019390</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-7a13dde21fd3b2f16c30bc622f5f3c1e3cbc5bdb64f241ad3eaf213c1d4fb3923</originalsourceid><addsrcrecordid>eNo9zDtPwzAUBWCLh0RVMjCz5A8k3GvHTj2GiEelSh2AuXLsa8WoJMh2keDXUwTiLGf4jg5jVwg1IuibXtYcQNX6hC1QSlUBaDhlhW5X0CotuVQCz_5txS9YkdIrHCN0gxwWbN0d8jjH8GVymKfq1iRyZWctpVT285TjvC_9HMs8UvlE8SMcpdzGQFP-GUY7hkw2HyJdsnNv9omKv16yl_u75_6x2mwf1n23qQK2MletQeEccfRODNyjsgIGqzj30guLJOxg5eAG1XjeoHGCjOd4FNf4QWguluz69zcQ0e49hjcTP3cNoBYaxDftOk6L</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authorization-Based Access Control for the Services Oriented Architecture</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Karp, A.H.</creator><creatorcontrib>Karp, A.H.</creatorcontrib><description>Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture</description><identifier>ISSN: 1556-0082</identifier><identifier>ISBN: 9780769525631</identifier><identifier>ISBN: 0769525636</identifier><identifier>EISSN: 1556-0090</identifier><identifier>DOI: 10.1109/C5.2006.9</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Authentication ; Authorization ; Identity management systems ; Security ; Semiconductor optical amplifiers ; Service oriented architecture ; Web services ; XML</subject><ispartof>Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06), 2006, p.160-167</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4019390$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>310,311,781,785,790,791,2059,27930,54925</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4019390$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Karp, A.H.</creatorcontrib><title>Authorization-Based Access Control for the Services Oriented Architecture</title><title>Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06)</title><addtitle>C5</addtitle><description>Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture</description><subject>Access control</subject><subject>Authentication</subject><subject>Authorization</subject><subject>Identity management systems</subject><subject>Security</subject><subject>Semiconductor optical amplifiers</subject><subject>Service oriented architecture</subject><subject>Web services</subject><subject>XML</subject><issn>1556-0082</issn><issn>1556-0090</issn><isbn>9780769525631</isbn><isbn>0769525636</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9zDtPwzAUBWCLh0RVMjCz5A8k3GvHTj2GiEelSh2AuXLsa8WoJMh2keDXUwTiLGf4jg5jVwg1IuibXtYcQNX6hC1QSlUBaDhlhW5X0CotuVQCz_5txS9YkdIrHCN0gxwWbN0d8jjH8GVymKfq1iRyZWctpVT285TjvC_9HMs8UvlE8SMcpdzGQFP-GUY7hkw2HyJdsnNv9omKv16yl_u75_6x2mwf1n23qQK2MletQeEccfRODNyjsgIGqzj30guLJOxg5eAG1XjeoHGCjOd4FNf4QWguluz69zcQ0e49hjcTP3cNoBYaxDftOk6L</recordid><startdate>200601</startdate><enddate>200601</enddate><creator>Karp, A.H.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200601</creationdate><title>Authorization-Based Access Control for the Services Oriented Architecture</title><author>Karp, A.H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-7a13dde21fd3b2f16c30bc622f5f3c1e3cbc5bdb64f241ad3eaf213c1d4fb3923</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Authorization</topic><topic>Identity management systems</topic><topic>Security</topic><topic>Semiconductor optical amplifiers</topic><topic>Service oriented architecture</topic><topic>Web services</topic><topic>XML</topic><toplevel>online_resources</toplevel><creatorcontrib>Karp, A.H.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Karp, A.H.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authorization-Based Access Control for the Services Oriented Architecture</atitle><btitle>Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06)</btitle><stitle>C5</stitle><date>2006-01</date><risdate>2006</risdate><spage>160</spage><epage>167</epage><pages>160-167</pages><issn>1556-0082</issn><eissn>1556-0090</eissn><isbn>9780769525631</isbn><isbn>0769525636</isbn><abstract>Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture</abstract><pub>IEEE</pub><doi>10.1109/C5.2006.9</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-0082 |
ispartof | Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06), 2006, p.160-167 |
issn | 1556-0082 1556-0090 |
language | eng |
recordid | cdi_ieee_primary_4019390 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Authentication Authorization Identity management systems Security Semiconductor optical amplifiers Service oriented architecture Web services XML |
title | Authorization-Based Access Control for the Services Oriented Architecture |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-16T01%3A49%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authorization-Based%20Access%20Control%20for%20the%20Services%20Oriented%20Architecture&rft.btitle=Fourth%20International%20Conference%20on%20Creating,%20Connecting%20and%20Collaborating%20through%20Computing%20(C5'06)&rft.au=Karp,%20A.H.&rft.date=2006-01&rft.spage=160&rft.epage=167&rft.pages=160-167&rft.issn=1556-0082&rft.eissn=1556-0090&rft.isbn=9780769525631&rft.isbn_list=0769525636&rft_id=info:doi/10.1109/C5.2006.9&rft_dat=%3Cieee_6IE%3E4019390%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4019390&rfr_iscdi=true |