Secure Semantic Web Service Using SAML
|
|
|
- Harvey Edwards
- 10 years ago
- Views:
Transcription
1 Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA Abstract: - The Semantic Web s success will depend on the implementation and use of Web service, becoming preeminent in E-commerce, which will likely be agent-based in the future. Agents use the large amount of information available over the web, but it will allow agents more subtle attacks. Agents and supporting technologies need to be secure and reliable for safe Web service as they adopt more mission critical roles within Web services,. In this paper, we ll discuss agent security on the Semantic Web. On the Semantic Web, agents play different roles in different platforms, dynamically change their access requirements, and act on behalf of users with different access privileges. In order to make agents secure, we ll propose a method that agents dynamically exchange their authentication and authorization information using SAML. And then, a few threats that may be happened in transit and countermeasures will be presented. Finally, we ll conclude our talks by presenting further works. Key-Words: - Semantic Web, SAML, Security, Agent, Web Service 1 Introduction People currently share their knowledge on the Web in the language intended for other people. This knowledge is potentially of great value for commercial as well as private users. But unfortunately, relevant information is often hidden amongst vast amount of irrelevant information that is also available on the Web. In recent years, researchers have begun to explore the potential of associating web content with explicit meaning so that the web content becomes more machine-readable and intelligent agents can retrieve and manipulate pertinent information readily. Semantic Web proposed by W3C is one of the most promising and accepted approaches. On the Semantic Web, we are able to express ourselves in terms that our computers can interpret and exchange. By doing so, we will enable them to solve problems that we find tedious and to help us find quickly what we re looking for, such as a movie review, a book purchase order, medical information, etc. The Semantic Web s success will depend on the implementation and use of Web service, becoming preeminent in E-commerce, which will likely be agent-based in the future. Using intelligent collaborations, agents can achieved global optimization while adapting to local requirements. This approach will let agents use the large amount of information available over the web, but it will allow agents more subtle attacks, for example, malicious users and their agents can disclose sensitive information or sabotage the information of others. Therefore, agents and supporting technologies need to be secure and reliable for safe Web service as agents adopt more mission critical roles within web services. In this paper, firstly, we ll discuss the security of agent, which is an important component of the Semantic Web technologies. On the Semantic Web, agents play different roles in different platforms, dynamically change their access requirements, and act on behalf of users with different access privileges, so they bring some security concerns. Next, in order to make agents secure on the Semantic Web, we ll propose a method that agents dynamically exchange their authentication and authorization information using Security Assertion Markup Language (SAML), ratified by the OASIS standards. And then, a few threats that may be happened in transit and countermeasures will be presented. Finally, we ll conclude our talks by presenting further works. 2 Overview of the Semantic Web The Semantic Web, proposed by W3C as the next generation web, is an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in
2 cooperation [1]. A key element to realizing the Semantic Web is developing a suitably rich language for encoding and describing Web content. Such a language must have a well-defined semantics, be sufficiently expressive to describe the complex interrelationships and constraints between Web objects, and be amenable to automated manipulation and reasoning with acceptable limits on time and resource requirements. Several languages build on XML. These include the Resource Description Framework (RDF), RDF Schema, DAML+OIL (DARPA Agent Markup Language + Ontology Inference Layer), and most recently, the Web Ontology Language (WOL). RDF integrates a variety of applications using XML for syntax and URIs for naming and is a foundation for processing metadata. It provides interoperability between applications that exchange machine-understandable information on the Web. RDF uses XML to exchange descriptions of Web resources and emphasizes facility to enable automated processing. DAML+OIL and OWL are Web ontology languages based on artificial intelligence knowledge representation work in description logics. They provide a natural way to describe class and sub class relationships between Web vocabulary, as well as constraints on the relationships between classes and between class instances. 2.1 Ontology and Agent The ontology is a logical theory accounting for the intended meaning of a formal vocabulary. Research on ontology is becoming increasingly widespread in the computer science community. In the semantic web, the ontology is a document or file that formally defines the relations among terms. The most typical kind of ontology for the Web has taxonomy and a set of inference rules. Ontologies can enhance the functioning of the Web in many ways, and RDF Schema, DAML+OIL and OWL supply the language to define the ontologies. Agent-based computing can potentially help us recognize complex patterns in the widely distributed, heterogeneous, uncertain information environment. To make agent understanding and interacting with data, we have to provide marked annotations attached to data sources. It makes information available to the agents in a new and exciting way. These kinds of solutions usually involve ontologies. The most typical type of ontology used in building agents involves a structural component. Essentially a taxonomy of class and subclass relations coupled with definitions of the relationships between these things. In addition, the ontologies contain some kind of inference rule. These can be explicit rules about an item, or they can be structural inferences provided by a system. If an ontology can be made machine readable, it allows a computer to manipulate the terms used in the ontology. Figure 1 shows the framework for agents on the semantic web. Fig. 1. Framework for agents on the Semantic Web One of the most powerful uses of the Web ontologies and a key enabler for agents on the Web is in the area of Web Services [2]. We can create machine-readable ontologies used by capable agents to find web services and automate their use. Using a combination of web pointers, web markup, and ontology languages, we can do even better than just putting service advertisements into ontologies. Rather, using these techniques we can also include a machine-readable description of a service and some explicit logic describing the consequences of using the service. In fact a service description and a service logic would lead us to the integration of agents and ontologies in some exciting ways. By using these two properties, agents in the Web Service environment can mediate among various heterogeneous Web sites, monitor contents and notify customers and perform precision information filtering and comparison. Additionally, they can provide tailored services according to the specialized needs of customers, assisting customers in making decisions, and act on behalf of customers in matchmaking, server monitoring, negotiation, transfer of goods, and follow-up support. 3 SAML The OASIS Security Assertion Markup Language (SAML) specification is an industry standard for the extensible Markup Language (XML) for exchanging
3 authentication, attribute, and authorization information [3]. Such exchanges occur, for example, between interacting applications that do not share the same underlying authentication and authorization infrastructure. The differences may be organizational or platform-based. In any case, SAML enables secure Web single sign on (SSO) to applications between different systems and platforms. SAML statements are called assertions. They are represented as XML constructions and have a nested structure, whereby a single assertion might contain several different information items referring to authentication, authorization decisions, and attributes such as credentials or group membership designator. It is becoming an important standard for federating user identities and it is applicable to both enterprise and value chain environments that need to leverage a user identity that can span traditional security domain boundaries. 4 Security on the Semantic Web To provide security for Semantic Web services, security models and tools for the underlying technologies, such as XML, RDF, DAML-OIL, need to be developed [4]. Especially, because intelligent agents, enabled to access and process large amounts of Web data, will be able to discover information that might be confidential, the features of interoperation and machine-enabled information processing ability may increase the danger. Guaranteeing information security means protecting information against unauthorized disclosure, transfer, modification or destruction, whether accidental or intentional. To realize it, any operation should only be accessible to properly authorized agents, proper identity of the agent must be reliably established by employing known authentication techniques, and sensitive data must be encrypted for network communication and persistent storage. Various security technologies for the web exist at present. These technologies have to be evaluated for the semantic web. Additionally it needs to incorporate security semantics into semantic interoperability. The various logics being developed for the semantic web need to be examined and security properties have to be incorporated. In this section, we will elaborate on the security for agent, which is necessarily required for secure Semantic Web. 4.1 Agent Security Agent technologies were designed with a focus on interoperability, distributed problem solving, and cooperation. Multiagent systems were intended to be responsive to open environments, such as the Internet, to capitalize on cooperative interaction. But this readiness to interact leaves them vulnerable to agents with harmful intentions. Protecting agent systems requires secure communication protocols and authentication and authorization mechanisms for proper access control, and distributed trust management [5]. 4.2 Traditional Agent Security Systems There are a few applications deploy security measurement. Among of them, we ll elaborate on the approach of JADE [6], which is principal-based, meaning that it relies on Java security policies and mechanisms for human users. Because a JADE agent platform can be distributed across several hosts and can support the interactions of autonomous entities, each component must belong to some user who is responsible for its actions. Hence, a JADE platform must know all users and be convinced of their authentication. The user in this system must be authenticated on the JADE platform by providing a valid username and password. A JADE policy, along with the permissions of the owners, determines which actions the agent can perform. Such traditional user and principal based security systems are likely to be insufficient to secure agent-based systems. Agents can play different roles in different platforms, dynamically change their access requirements, and act on behalf of users with different access privileges. Without relying on a centralized trust management system, agents must be able to decide whether or not to trust other agents or platforms. 5 SAML for Agent Security on the Semantic Web The Organization for Advanced of Structured Information Standards (OASIS) has defined the XML-based Security Assertion Markup Language. It adopted as a standard the exchange of authentication and authorization information. One of the major design goals with SAML is single sign on, which allows a user to authenticate a domain and use
4 resources in other domains without reauthenticating. This standard is a significant protocol for agents as these agents engage and interact with resources and other agents in various domains, because the SAML support dynamical authentication and authorization mechanism. In this section, we ll present an agent security scenario based on the SAML and discuss several threats that can be happened during communication and countermeasures for them. other agents or platforms without relying on a centralized trust management system. 5.1 Scenario This scenario is the elaboration of a kind of communications between agents or the agent and platform through attribute exchange with authentication reference called an artifact. An artifact is small bounded size of byte string. When artifact is conveyed to the source site the artifact unambiguously references an assertion. The artifact is conveyed via redirection to the destination site, which then acquires the referenced assertion by some further step. An agent that wants to access to information or a resource on a site gets an artificial that asserts it is reliable from a trusted party (Step 1). It searches and requests what it wants, providing the artifact to a destination (Step 2). Then the destination requests the trusted party an authentication document called assertion, passing the artifact. In this step, the site also authenticates itself with its certificate that is digitally signed by a certification author ity (Step 3). If the artifact is valid, the trusted party returns the authentication document of agent A. This document includes authentication event descriptions and authorization attributes about the agent (Step 4). Finally the site allows the agent to access on information or resource (Step 5). Figure 2 shows a secure communication scenario between an agent and a site using SAML. This method basically exchanges authentication and authorization information. It allows protecting not only agent execution environment from a malicious agent, but also an agent from a malicious platform by bilateral authentication. In addition, it ensures that the agent is authorized to be access on limited information or resources by sending an attribute assertion. On the Semantic Web, agents can play different roles in different platforms, dynamically change their access requirements, and act on behalf of users with different access privileges. Our proposal enables agents to be able to decide dynamically whether or not to trust Fig. 2. This scenario shows a communication between an agent and a site using SAML 5.2 Threat model and countermeasures In the upper scenario, we can infer a few threat models. In the first place, we assume that a valid agent requests a malicious site some information. After the site allows access to a resource, it stores the artifact sent by the agent A for other purpose. It may impersonate the agent with the artifact on some new site or to agent. To alleviate this concern, the artifact needs to have shortest possible validity period consistent with successful communication of the artifact from source to destination site. This is typically in the order of a few minutes. This ensures that a stolen artifact can only be used successfully within a small time window. The second case is that a malicious agent asks for some information of a site with other s artifact. A countermeasure is that it makes the trusted party determine if an artifact is being requested by more than one site or agent or not. In such a case, the trusted party must not provide the assertions to the site, then the site will not permit the access. Finally, the use of SAML assumes and requires trust between participants, but the SAML protocol does not include provisions to establish or guarantee this trust. SAML is not concerned with guaranteeing confidentiality, integrity, or nonrepudiability of the assertions in transit. For these purpose, it needs XML Enc and XML Dsig or other mechanism provided by the underlying communication protocol and platform.
5 6 Conclusion and Further Works The Semantic Web will make the Web more accessible to agents by making use of semantic constructs, such as ontologies represented in well-established languages, so that agents can understand what is on a page. And as they are highly desirable for interoperability, this feature is scary from the security perspective. Illegal interfaces, supported by Semantic Web technologies and ontologies, might enable user to access unauthorized information. In this paper, we have proposed a method that agents exchange their authentication and authorization information using SAML so as to make them secure on the Semantic Web. Because SAML allows exchanging authentication and authorization information between interacting applic ations that do not share the same underlying security infrastructure, it is suitable to protect agents, which has various role and responsibility in different system with their dynamic access requirements. Our method not only protects the agent against the some sites and other agent, but also guards the host against the malicious agents. This paper provides only preliminary method for making agents secure on the Semantic Web using SAML. Therefore, we have something to do for increasing security. Most of all the technologies that make up the Semantic Web have to be secure. These include not only agents, but also XML, RDF, the infrastructures, information and data management technologies. And the security is also preserved when integrating data and the technologies. Next, we need to develop the semantic web profile and binding protocol of SAML. Currently, SAML has provided Web browser profile and SOAP binding protocol. Well-defined profile and binding protocol will provide agents on the Semantic Web interoperability as well as security. International Conference on Tools with Artificial Intelligence, 2002 [5] M.N. Nuhns, Agent as Web Services IEEE Computing, pp 93-95, July-Aug,, 2002 [6] G. Vitaglione, Jade Tutorial: Security Administrator Guide, Sept. 2002, curityadminguide.pdf References: [1] T. Berners-Lee, J. Hendler, and O. Lassila, The Semantic Web, Scientific Am., vol. 284, no. 5, pp.34-43, May [2] J. Hendler, Agents and the Semantic Web, IEEE Intelligent System, March/April [3] Assertion and Protocol for the OASIS Security Assertion Markup Language (SAML) 1.0, OASIS, Nov [4] B. Thuraisingham, Building Secure survivable semantic webs, Proceedings 14th IEEE
HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM)
HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) Nasim Khozoie Department of Computer Engineering,yasuj branch, Islamic Azad University, yasuj, Iran [email protected] ABSTRACT Information
SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun
SAML Security Analysis Huang Zheng Xiong Jiaxi Ren Sijun outline The intorduction of SAML SAML use case The manner of SAML working Security risks on SAML Security policy on SAML Summary my course report
On the Standardization of Semantic Web Services-based Network Monitoring Operations
On the Standardization of Semantic Web Services-based Network Monitoring Operations ChenglingZhao^, ZihengLiu^, YanfengWang^ The Department of Information Techonlogy, HuaZhong Normal University; Wuhan,
OWL based XML Data Integration
OWL based XML Data Integration Manjula Shenoy K Manipal University CSE MIT Manipal, India K.C.Shet, PhD. N.I.T.K. CSE, Suratkal Karnataka, India U. Dinesh Acharya, PhD. ManipalUniversity CSE MIT, Manipal,
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University
I. INTRODUCTION NOESIS ONTOLOGIES SEMANTICS AND ANNOTATION
Noesis: A Semantic Search Engine and Resource Aggregator for Atmospheric Science Sunil Movva, Rahul Ramachandran, Xiang Li, Phani Cherukuri, Sara Graves Information Technology and Systems Center University
Lightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
ONTOLOGY-BASED MULTIMEDIA AUTHORING AND INTERFACING TOOLS 3 rd Hellenic Conference on Artificial Intelligence, Samos, Greece, 5-8 May 2004
ONTOLOGY-BASED MULTIMEDIA AUTHORING AND INTERFACING TOOLS 3 rd Hellenic Conference on Artificial Intelligence, Samos, Greece, 5-8 May 2004 By Aristomenis Macris (e-mail: [email protected]), University of
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
An Ontology-based e-learning System for Network Security
An Ontology-based e-learning System for Network Security Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi Sendai National College of Technology [email protected] Goichi Itabashi Graduate School
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Run-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
The Ontology and Architecture for an Academic Social Network
www.ijcsi.org 22 The Ontology and Architecture for an Academic Social Network Moharram Challenger Computer Engineering Department, Islamic Azad University Shabestar Branch, Shabestar, East Azerbaijan,
ONTOLOGY-BASED APPROACH TO DEVELOPMENT OF ADJUSTABLE KNOWLEDGE INTERNET PORTAL FOR SUPPORT OF RESEARCH ACTIVITIY
ONTOLOGY-BASED APPROACH TO DEVELOPMENT OF ADJUSTABLE KNOWLEDGE INTERNET PORTAL FOR SUPPORT OF RESEARCH ACTIVITIY Yu. A. Zagorulko, O. I. Borovikova, S. V. Bulgakov, E. A. Sidorova 1 A.P.Ershov s Institute
A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS
A HUMAN RESOURCE ONTOLOGY FOR RECRUITMENT PROCESS Ionela MANIU Lucian Blaga University Sibiu, Romania Faculty of Sciences [email protected] George MANIU Spiru Haret University Bucharest, Romania Faculty
Supporting Change-Aware Semantic Web Services
Supporting Change-Aware Semantic Web Services Annika Hinze Department of Computer Science, University of Waikato, New Zealand [email protected] Abstract. The Semantic Web is not only evolving into
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
A Collaborative System Software Solution for Modeling Business Flows Based on Automated Semantic Web Service Composition
32 A Collaborative System Software Solution for Modeling Business Flows Based on Automated Semantic Web Service Composition Ion SMEUREANU, Andreea DIOŞTEANU Economic Informatics Department, Academy of
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Incorporating Semantic Discovery into a Ubiquitous Computing Infrastructure
Incorporating Semantic Discovery into a Ubiquitous Computing Infrastructure Robert E. McGrath, Anand Ranganathan, M. Dennis Mickunas, and Roy H. Campbell Department of Computer Science, University or Illinois
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Security Issues for the Semantic Web
Security Issues for the Semantic Web Dr. Bhavani Thuraisingham Program Director Data and Applications Security The National Science Foundation Arlington, VA On leave from The MITRE Corporation Bedford,
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
Open Source egovernment Reference Architecture Osera.modeldriven.org. Copyright 2006 Data Access Technologies, Inc. Slide 1
Open Source egovernment Reference Architecture Osera.modeldriven.org Slide 1 Caveat OsEra and the Semantic Core is work in progress, not a ready to use capability Slide 2 OsEra What we will cover OsEra
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS Myungsoo Kang 1, Choong Seon Hong 1,Hee Jung Koo 1, Gil Haeng Lee 2 1 Department of Computer Engineering, Kyung Hee University
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Performance Analysis, Data Sharing, Tools Integration: New Approach based on Ontology
Performance Analysis, Data Sharing, Tools Integration: New Approach based on Ontology Hong-Linh Truong Institute for Software Science, University of Vienna, Austria [email protected] Thomas Fahringer
Semantic Web Services for e-learning: Engineering and Technology Domain
Web s for e-learning: Engineering and Technology Domain Krupali Shah and Jayant Gadge Abstract E learning has gained its importance over the traditional classroom learning techniques in past few decades.
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
A Framework for Collaborative Project Planning Using Semantic Web Technology
A Framework for Collaborative Project Planning Using Semantic Web Technology Lijun Shen 1 and David K.H. Chua 2 Abstract Semantic web technology has become an enabling technology for machines to automatically
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Information Services for Smart Grids
Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic
Annotea and Semantic Web Supported Collaboration
Annotea and Semantic Web Supported Collaboration Marja-Riitta Koivunen, Ph.D. Annotea project Abstract Like any other technology, the Semantic Web cannot succeed if the applications using it do not serve
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we
XML for Manufacturing Systems Integration
Information Technology for Engineering & Manufacturing XML for Manufacturing Systems Integration Tom Rhodes Information Technology Laboratory Overview of presentation Introductory material on XML NIST
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
Ontology and automatic code generation on modeling and simulation
Ontology and automatic code generation on modeling and simulation Youcef Gheraibia Computing Department University Md Messadia Souk Ahras, 41000, Algeria [email protected] Abdelhabib Bourouis
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
SemWeB Semantic Web Browser Improving Browsing Experience with Semantic and Personalized Information and Hyperlinks
SemWeB Semantic Web Browser Improving Browsing Experience with Semantic and Personalized Information and Hyperlinks Melike Şah, Wendy Hall and David C De Roure Intelligence, Agents and Multimedia Group,
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
Information Technology for KM
On the Relations between Structural Case-Based Reasoning and Ontology-based Knowledge Management Ralph Bergmann & Martin Schaaf University of Hildesheim Data- and Knowledge Management Group www.dwm.uni-hildesheim.de
CONTEMPORARY SEMANTIC WEB SERVICE FRAMEWORKS: AN OVERVIEW AND COMPARISONS
CONTEMPORARY SEMANTIC WEB SERVICE FRAMEWORKS: AN OVERVIEW AND COMPARISONS Keyvan Mohebbi 1, Suhaimi Ibrahim 2, Norbik Bashah Idris 3 1 Faculty of Computer Science and Information Systems, Universiti Teknologi
FIPA agent based network distributed control system
FIPA agent based network distributed control system V.Gyurjyan, D. Abbott, G. Heyes, E. Jastrzembski, C. Timmer, E. Wolin TJNAF, Newport News, VA 23606, USA A control system with the capabilities to combine
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Semantic Interoperability
Ivan Herman Semantic Interoperability Olle Olsson Swedish W3C Office Swedish Institute of Computer Science (SICS) Stockholm Apr 27 2011 (2) Background Stockholm Apr 27, 2011 (2) Trends: from
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
SEMANTIC WEB BUSINESS MODELS
SEMANTIC WEB BUSINESS MODELS Borce Cifliganec Postgraduate Radovis, R.Macedonia Ph.D. Dimitar Trajanov FEIT Skopje, R.Macedonia ABSTRACT With the emergence of the Semantic Web, that represents an extension
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Ontology-based Product Tracking System
Ontology-based Product Tracking System Vikram N. Ketkar, Larry Whitman & Don Malzahn Department of Industrial and Manufacturing Engineering Wichita State University Wichita, KS 67260 Abstract Product tracking
CONCEPT OF OPERATIONS FOR THE SWIM COMMON REGISTRY (SCR)
CONCEPT OF OPERATIONS FOR THE SWIM COMMON REGISTRY (SCR) FAA/SESAR APRIL 2015 Preface The proposed SWIM Common Registry (SCR) is envisioned as a comprehensive, systematic, and dynamic mechanism for publishing,
APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION
18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK
Application of ontologies for the integration of network monitoring platforms
Application of ontologies for the integration of network monitoring platforms Jorge E. López de Vergara, Javier Aracil, Jesús Martínez, Alfredo Salvador, José Alberto Hernández Networking Research Group,
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents
A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
SmartLink: a Web-based editor and search environment for Linked Services
SmartLink: a Web-based editor and search environment for Linked Services Stefan Dietze, Hong Qing Yu, Carlos Pedrinaci, Dong Liu, John Domingue Knowledge Media Institute, The Open University, MK7 6AA,
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF) Introduction SonicWALL Unified Threat Management (UTM) appliances running SonicOS Enhanced 3.0 support
A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems
Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Semantic Knowledge Management System. Paripati Lohith Kumar. School of Information Technology
Semantic Knowledge Management System Paripati Lohith Kumar School of Information Technology Vellore Institute of Technology University, Vellore, India. [email protected] Abstract The scholarly activities
Distributed Identity Management Model for Digital Ecosystems
International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University
