Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
On the applicability of trusted computing in distributed authorization using Web services
KTH, School of Technology and Health (STH), Informatics, logistics and management (Closed 20130701).
2008 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Distributed authorization provides the ability to control access to resources spread over the Internet. Typical authorization systems consider a range of security information like user identities, role identities or even temporal, spatial and contextual information associated with the access requestor. However, the ability to include computing platform related information has been quite limited due to constraints in identification and validation of platforms when distributed. Trusted computing is an exciting technology that can provide new ways to bridge this gap. In this paper, we provide the first steps necessary to achieving distributed authorization using trusted computing platforms. We introduce the notion of a Property Manifest that can be used in the specification of authorization policies. We provide an overview of our authorization architecture, its components and functions. We then illustrate the applicability of our system by implementing it in a Web service oriented architecture.

Place, publisher, year, edition, pages
2008. 222-237 p.
Series
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743
Keyword [en]
Access control, Web services, World Wide Web, Authorization architecture, Authorization policies, Authorization systems, Computing platforms, Contextual information, Control access, Role identities, Trusted computing, Information services
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-154436DOI: 10.1007/978-3-540-70567-3_18ISI: 000257948400018Scopus ID: 2-s2.0-50249184705ISBN: 354070566X (print)ISBN: 9783540705666 (print)OAI: oai:DiVA.org:kth-154436DiVA: diva2:758799
Conference
22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 13-16 July 2008, London, United Kingdom
Note

QC 20141028

Available from: 2014-10-28 Created: 2014-10-20 Last updated: 2017-03-24Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Arora, Saurabh
By organisation
Informatics, logistics and management (Closed 20130701)
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 43 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf