Dynamically authorized role-based access control for secure distributed computation

  • Authors:
  • C. Joncheng Kuo;Polar Humenn

  • Affiliations:
  • Syracuse University, Syracuse, NY;Syracuse University, Syracuse, NY

  • Venue:
  • Proceedings of the 2002 ACM workshop on XML security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a mechanism for using the Object Management Group's Common Secure Interoperability Version 2 (CSIv2), Authorization Token Layer Acquisition Service (ATLAS), and XML security standards such as Security Assertion Markup Language (SAML) to develop role-based access control (RBAC) in a secure distributed computation system.The need for RBAC became evident in this kind of system because the components of the system are configured dynamically in specific neighbor relationships to each other. We use roles to model the neighboring relationships, which are reflected in the access control policy.We describe the use of an "authorization domain" defined in the ATLAS to authorize and scope the roles granted to clients. Each component of the computation system is associated with a particular authorization domain. Authenticated principals are authorized for a particular role in an authorization domain at neighborhood configuration time. The access control policy of components is based solely on the role of its requesting client, resulting the access control policy of components to remain static while the configuration of the system remains dynamic.We show the method in which we use the CSIv2, ATLAS, and SAML standards to activate authorized roles, which in turn, allows us to implement RBAC policies to guard CORBA requests. This approach gives the mechanism by which we can secure our CORBA based distributed computation system.