Authorization-Based Access Control for the Services Oriented Architecture

Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Karp, A.H.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 167
container_issue
container_start_page 160
container_title
container_volume
creator Karp, A.H.
description Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture
doi_str_mv 10.1109/C5.2006.9
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4019390</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4019390</ieee_id><sourcerecordid>4019390</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-7a13dde21fd3b2f16c30bc622f5f3c1e3cbc5bdb64f241ad3eaf213c1d4fb3923</originalsourceid><addsrcrecordid>eNo9zDtPwzAUBWCLh0RVMjCz5A8k3GvHTj2GiEelSh2AuXLsa8WoJMh2keDXUwTiLGf4jg5jVwg1IuibXtYcQNX6hC1QSlUBaDhlhW5X0CotuVQCz_5txS9YkdIrHCN0gxwWbN0d8jjH8GVymKfq1iRyZWctpVT285TjvC_9HMs8UvlE8SMcpdzGQFP-GUY7hkw2HyJdsnNv9omKv16yl_u75_6x2mwf1n23qQK2MletQeEccfRODNyjsgIGqzj30guLJOxg5eAG1XjeoHGCjOd4FNf4QWguluz69zcQ0e49hjcTP3cNoBYaxDftOk6L</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authorization-Based Access Control for the Services Oriented Architecture</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Karp, A.H.</creator><creatorcontrib>Karp, A.H.</creatorcontrib><description>Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture</description><identifier>ISSN: 1556-0082</identifier><identifier>ISBN: 9780769525631</identifier><identifier>ISBN: 0769525636</identifier><identifier>EISSN: 1556-0090</identifier><identifier>DOI: 10.1109/C5.2006.9</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Authentication ; Authorization ; Identity management systems ; Security ; Semiconductor optical amplifiers ; Service oriented architecture ; Web services ; XML</subject><ispartof>Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06), 2006, p.160-167</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4019390$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>310,311,781,785,790,791,2059,27930,54925</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4019390$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Karp, A.H.</creatorcontrib><title>Authorization-Based Access Control for the Services Oriented Architecture</title><title>Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06)</title><addtitle>C5</addtitle><description>Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture</description><subject>Access control</subject><subject>Authentication</subject><subject>Authorization</subject><subject>Identity management systems</subject><subject>Security</subject><subject>Semiconductor optical amplifiers</subject><subject>Service oriented architecture</subject><subject>Web services</subject><subject>XML</subject><issn>1556-0082</issn><issn>1556-0090</issn><isbn>9780769525631</isbn><isbn>0769525636</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9zDtPwzAUBWCLh0RVMjCz5A8k3GvHTj2GiEelSh2AuXLsa8WoJMh2keDXUwTiLGf4jg5jVwg1IuibXtYcQNX6hC1QSlUBaDhlhW5X0CotuVQCz_5txS9YkdIrHCN0gxwWbN0d8jjH8GVymKfq1iRyZWctpVT285TjvC_9HMs8UvlE8SMcpdzGQFP-GUY7hkw2HyJdsnNv9omKv16yl_u75_6x2mwf1n23qQK2MletQeEccfRODNyjsgIGqzj30guLJOxg5eAG1XjeoHGCjOd4FNf4QWguluz69zcQ0e49hjcTP3cNoBYaxDftOk6L</recordid><startdate>200601</startdate><enddate>200601</enddate><creator>Karp, A.H.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200601</creationdate><title>Authorization-Based Access Control for the Services Oriented Architecture</title><author>Karp, A.H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-7a13dde21fd3b2f16c30bc622f5f3c1e3cbc5bdb64f241ad3eaf213c1d4fb3923</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Authorization</topic><topic>Identity management systems</topic><topic>Security</topic><topic>Semiconductor optical amplifiers</topic><topic>Service oriented architecture</topic><topic>Web services</topic><topic>XML</topic><toplevel>online_resources</toplevel><creatorcontrib>Karp, A.H.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Karp, A.H.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authorization-Based Access Control for the Services Oriented Architecture</atitle><btitle>Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06)</btitle><stitle>C5</stitle><date>2006-01</date><risdate>2006</risdate><spage>160</spage><epage>167</epage><pages>160-167</pages><issn>1556-0082</issn><eissn>1556-0090</eissn><isbn>9780769525631</isbn><isbn>0769525636</isbn><abstract>Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access control is a key contributor to these failures and proposes another way to approach the problem. Basing access control decisions on authorizations presented explicitly by the requester leads to a more securable and more robust architecture</abstract><pub>IEEE</pub><doi>10.1109/C5.2006.9</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-0082
ispartof Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06), 2006, p.160-167
issn 1556-0082
1556-0090
language eng
recordid cdi_ieee_primary_4019390
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Authentication
Authorization
Identity management systems
Security
Semiconductor optical amplifiers
Service oriented architecture
Web services
XML
title Authorization-Based Access Control for the Services Oriented Architecture
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-16T01%3A49%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authorization-Based%20Access%20Control%20for%20the%20Services%20Oriented%20Architecture&rft.btitle=Fourth%20International%20Conference%20on%20Creating,%20Connecting%20and%20Collaborating%20through%20Computing%20(C5'06)&rft.au=Karp,%20A.H.&rft.date=2006-01&rft.spage=160&rft.epage=167&rft.pages=160-167&rft.issn=1556-0082&rft.eissn=1556-0090&rft.isbn=9780769525631&rft.isbn_list=0769525636&rft_id=info:doi/10.1109/C5.2006.9&rft_dat=%3Cieee_6IE%3E4019390%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4019390&rfr_iscdi=true