An authentication model for delegation, attribution and least privilege

  • Authors:
  • Ebrima N. Ceesay;Coimbatore Chandersekaran;William R. Simpson

  • Affiliations:
  • Booz Allen Hamilton, Herndon, VA;The Institute for Defense Analyses, Alexandria, VA;The Institute for Defense Analyses, Alexandria, VA

  • Venue:
  • Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The need to share information while maintaining privacy and security is a growing problem in health, finance, defense, and other distributed environments. Mitigating threats in a distributed computing environment is a difficult task and requires constant vigilance and defense-in-depth. Most systems lack a secure model that guarantees an end-to-end security. In this paper, we devise a model that mitigates a number of threats to the distributed computing pervasive in corporate and institutional information technology enterprises. This authentication process is part of a larger information assurance systemic approach that requires that all active entities (users, machines and services) are named, and credentialed. Authentication is bilateral using PKI credentialing, and authorization is based upon Security Assertion Markup Language (SAML) attribution statements. Communication across domains is handled as a federation activity using WS-* protocols. We present the architectural model, elements of which are currently being demonstrated and tested in a functional prototype in a boundary protected area processing center. The architecture is also applicable to a private cloud.