Secure Information Sharing Using Attribute Certificates and Role Based Access Control
|
|
|
- Eric Lane
- 10 years ago
- Views:
Transcription
1 1 Secure Information Sharing Using Attribute Certificates and Role Based Access Control Ganesh Godavari and dward Chow Department of Computer Science University of Colorado Colorado Springs, Colorado mail: gkgodava, Abstract In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based on LDAP servers and web servers was built to explore the use of the attribute certificate, public key digital certificate, and role-based access control for secure access and efficient authorization. LDAP servers were enhanced to accept attribute certificates. The LDAP module for the apache web server was extended to submit the LDAP query based on the subject field of the client certificate, and to authorize the web access based on the attribute certificate return from a LDAP server. Preliminary performance of the SIS prototype shows that the techniques and tools developed can rapidly set up the PKI and PMI for a large scale multi-agency, web-based, SIS system and support secure web accesses based on the effective role-based access control and authorization. The main contribution of our paper is the development of framework that makes use PKI, RBAC, PMI, and webservices for information sharing based on authentication, authorization, and access. The framework and the software packages developed can be used to support the critical information and communication needs of a joint task force assembled for unexpected natural disasters, nuclear/chemical accidents, or terrorist attacks. Index Terms Secure Information Sharing, Attribute Certificate, LDAP, PKI, PMI. I. INTRODUCTION As the WWW is quickly becoming a place for sharing of information, piracy and misuse of information are quickly becoming a threat. Security and Authorization become necessary. This situation not only provides excellent business opportunities but also posts research challenges. One of the most challenging problems in managing large secure information sharing (SIS) systems is the complexity of security administration, particularly the management of digital certificates and the role based access control. The creation and management of an SIS system for a rapidly deployed joint task force from multiple agencies impose the stringent requirements on the information infrastructure, since both the public key infrastructure (PKI) and the privilege management infrastructure (PMI) need to be set up quickly and to process large volume of requests. The related digital certificates need to be signed and distributed to large members of the task force. The servers, applications, and resource utilized by the task force needs to be configured to recognize the new certificates and to provide secure access according the roles of the members. Role-Based Access Control (RBAC) simplifies the access control administration and provides better manageability in enterprise environments by allowing permissions to be managed in terms of user job roles [8]. RBAC maps user job roles to application permissions so that the access control administration can be accomplished in terms of the job role of users. This means that administrators will have to set up and assign clients with roles, such as employee, manager and administrator, without having to change the access permission on each client. Many of the e-commerce applications require authorization services, in addition to the authentication services provided by PKI, to allow users to do what they are allowed to do. Public key certificate (PKC) strongly bind a public key to its subject (country, location, organization unit etc.) helping in identifying the holder of the certificate. Attribute certificates (AC) have been proposed as a solution for the authorization services [2], [6], [15]. AC conveys a potentially short-lived attribute about a given subject to facilitate flexible and scalable privilege management. The attribute certificate may point to a public-key certificate that can be used to authenticate the identity of the attribute certificate holder. LDAP provides organizations with a fast, efficient and scalable way to store, manage, search and retrieve X.500 directories. X.500 directories are hierarchical with different levels for each category of information, such as country, organization, organizational unit, person etc, and provide an ideal environment for storing of AC. Some research and development efforts have been done in this area [2], [6], [15], but these efforts are still in preliminary phase, and no authorization mechanism is widely accepted. We were motivated by the need of using PKI, PMI and RBAC concepts to construct an authorization mechanism which uses the PRMIS [1], [2] model of storing the user s roles in ACs. Access control decisions are driven by an authorization policy, and the authorization policy is also stored in an AC. The organization of this paper is as follows. Section 2 provides an overview of the related research. Section 3 describes the design and implementation of the secure information sharing (SIS) system architecture. In Section 4 we present the SIS prototype and analysis of its performance results. In Section 5, and 6 we discuss future directions of research and conclusions.
2 2 II. RLATD RSARCH TCHNOLOGIS A. Role Based Access Control Role-based access control [3], [4], [12], [14], [16] has gained attention as a proven alternative to traditional discretionary and mandatory access control mechanisms. RBAC helps specify organization s security policies reflecting its organizational structure. RBAC reference model and functional specification are organized into four components: Core RBAC, Hierarchical RBAC, Static Separation of Duty Relations (SSD), Dynamic Separation of Duty Relations (DSD). In the core RBAC, a user can be assigned one or more roles, and a role can be assigned to one or more users. Roles are based on the user s job responsibilities in the organization. This provides for flexibility and finer granularity during the assignment of access permissions to roles and users to roles. In the hierarchal RBAC model, the role hierarchy partially determines which roles and permissions are available to users via inheritance. For example, a senior role can inherit permissions from junior roles. A user establishes a session during which he activates some subset of roles of which he is a member. SSD relations help in preventing conflict of interests, that arise when user gains permission associated with conflicting roles. DSD relations help to place constraints on roles that can be activated in the session of a user. USRS user_sessions (UA) User Assignment SSSIONS (RH) Role Hierarchy ROLS session_roles (PA) Permission Assignment OPS PRMS OBS role, etc., to users, and issues and manages it using the X.509 Attribute Certificate. Attribute Certificates (ACs) were initially introduced in Recommendation X , but they were fully covered in Recommendation X published in year The PKIX WG from the ITF has endorsed a profile of attribute certificates in April 2002 with the RFC The PMI supports access control service using the user s privilege management in application services. The function of the PMI is to specify the policy for the attribute certificate issuance and management. Then, the PMI carries out the ACrelated management functions such as issuing, updating, and revoking an attribute certificate based on a specified policy. n PMI the ACs issuer is called Attribute Authority (AA). ACs are digitally signed by the AA, so they are tamperresistant. The trusted root is called source of authority (SOA). When a user s authorization permissions need to be revoked, AA will issue an attribute certificate revocation list (ACRL) containing the list of ACs no long to be trusted. There are two primary models for distribution of attribute certificates: the push or pull model. In the push model the client needs to present its AC to the server, so the client needs to contain AC. The push model is suitable in application where the client s permissions should be authenticated/validated in the client s home domain. In the pull model the client presents its identity to the server, the server retrieves the client s AC from a repository. Therefore the client does not contain AC. The pull model is suitable when the client s privileges should be authenticated in the inter-domain. In the pull model a change in the organizations role permissions only requires an update in the repository, while in the push model clients with the same role need to update their AC. Figure 2 below shows the difference between PKC s, and AC s. PKC binds a subject(dn) to a public key while AC s have no Public Key but binds permission (attributes) to an entity. Fig. 1. Core RBAC [8] Version Version The Core RBAC in Figure 1 consists of 1) a set of users (USRS) where a user is an intelligent autonomous agent, 2) a set of roles (ROLS) where a role is a job function, 3) a set of objects (OBS) where an object is an entity that contains or receives information, 4) a set of operations (OPS) where an operation is an executable image of a program, and 5) a set of permissions (PRMS) where a permission is an approval to perform an operation on objects. The cardinalities of the relationships are indicated by the absence (denoting one) or presence of arrows (denoting many) on the corresponding associations. For example, the association of user to session is one-to-many. All other associations shown in the figure are many-to-many. The association labeled Role Hierarchy defines the inheritance relationship among roles. Further information about RBAC is available at [8]. B. Privilege Management Infrastructure (PMI) PMI is the information security infrastructure that assigns privilege attribute information such as privilege, capability, and Fig. 2. Signature Serial Number Signature ID Subject Issuer Validity Period Subject Public Key Info xternsions Public Key Certificate (PKC) PKC and Attribute certificates Serial Number Signature ID Holder Issuer Validity Period Attributes xternsions Attribute Certificate (AC) Further information about AC is available at [13]. C. Related work Currently there are two authorization systems Akenti [15] and PRMIS that are closely related to our work. The focus of our work is towards multi-agency information sharing, while these models are currently being used for grid computing. Ours is the first work that makes use of PKI, RBAC, PMI, and webservices for information sharing based on authentication, Signature
3 3 authorization, and access. There are two major differences between Akenti and our model. AC s used in Akenti are in a non-standard format while ours follow RFC The access control in Akenti is essentially a classical access control list (discretionary access controls) model, whereas our model implements partial role based access control. There is one major differences between PRMIS and our model. Our model requires the user to present an X.509 public key certificate at authentication time, whereas PRMIS is authentication agnostic and leaves it up to the application to determine what type of authentication to use. III. DSIGN AND IMPLMNTATION OF AN SIS SYSTM A. Design Considerations Although the concept of role-based access control (RBAC) began 25 years ago, It gained wide spread interest in 90 s. A study by NIST [12] on 28 organizations revealed that RBAC addresses many needs of the commercial and government sectors. In this study of 28 organizations it was found that many organizations based access control decisions on the roles that individual users take on as part of the organization and also found that permissions assigned to roles tend to change relatively slowly compared to the changes in user membership of roles. With RBAC it is possible to predefine role-permission relationships, which makes it simple to assign users to the predefined roles. Since access control mechanism is crucial in enforcing and tracking secure information distribution and traditional discretionary and mandatory access control are too restricted, we have investigated RBAC, which provides flexibility and allows dynamic update. National Institute of Standards and Technology (NIST) has recently ratified RBAC draft into a standard. RBAC is currently being used in various database management systems like Sybase and J2/Java servers. The central notion of RBAC is that permissions are associated with roles, and users are assigned to appropriate roles. This greatly simplifies management of permissions. Roles are created for the various job functions in an organization and users are assigned roles based on their responsibilities and qualifications. Users can be easily reassigned from one role to another. Roles can be granted new permissions as new applications and systems are incorporated, and permissions can be revoked from roles as needed. RBAC model can be used for interaction between organizations are planning to coordinate and share information in entirety or part wise. Some of the challenges faced in ensuring cooperation are Confidentiality: Information available at the organizations is confidential and should not be shared with people outside the organization(s). Access to such information has to be restricted to a selected group of people with in the organizations that are involved in the cooperation. This problem becomes hard if the roles of the people outside the organization are not defined properly. Non-Repudiation: The shared information may changed by people belonging to various organization. Changes made must be monitored to ensure reliability of the information, along with the ability to provide non-repudiation service for changes made to the shared information. Decentralized maintenance and control: Information shared by each organizational should be managed and maintained by that organization. This helps not only to remove the disputes raised by questions like who is responsible for what?, but also simplifies the maintenance of information. If USR-A of Organization-A wants to access information from organization-b, then organization-b is responsible for providing a certificate to USR-A for authentication and authorization. These certificates are stored at Organization-A along with other information about USR-A in the LDAP server. This might cause the user to be overwhelmed by number of certificates he needs to maintain; one for each organization involved in the coordination. LDAP is now widely being used in organizations for fast, efficient and scalable way to store, manage, search and retrieve X.500 directories. A directory might contain entries describing people in the organization or network resources, such as printers or fax machines being used in the organization. Akenti and PRMIS authorization infrastructure systems store AC in LDAP servers. Features of scalability, replication, and simplicity in querying for information, and security features provided by TLS/SSL makes LDAP server an ideal for storing AC rather than databases. B. stablishing PKI for SIS When a task force is formed with multiple agencies or organizations, the first task is to issue a valid certificate to the members of the task force. User certificate maintenance problem can be alleviated, if all the organizations participating in the information sharing service have the same rootca. The following steps outline a procedure for setting up a PKI for the task force. 1) The coordinator of the task force from multiple agencies set up a rootca-ma (root CA for Multiple Agencies). 2) ach agency requests a certificate to be signed by rootca-ma. 3) ach agency issues a new PKC to each user in its organization involved in the task force. 4) At each server which providing secure information sharing service for this task force, add the rootca-ma information into CABundle (file containing list of valid CA s). 5) ach client/user installs the certificate in the local browser or application(s). With a large task force, it takes a long time for the PKI to be established. We developed a tool for automating the certificate creation process. We compare the performance of this automated tool with that of manual signing process. The automated tool uses expect library and OpenSSL to sign the certificates. Automated tool can sign 100 certificates in 2 min and 13 sec on a Pentium-III machine with 512 MHz, 512 MB RAM configuration. Based on my own person experience generating one certificate manually takes about 2 min 35
4 4 sec. In a joint task force with 100 organizations and 100 participants from each organization coordinating, in the worst case the time taken in the manual process is 516 min and 40 sec, while time taken in an automated process = 2 min and sec. C. stablishing PMI for SIS The leaders of the task force will decide the roles of its members. To speed up the rapid deployment process, the existing information infrastructure, such as LDAP servers at those agencies can be recruited to serve as the PMI components for the SIS system. The other possibility to set up a dedicated SIS system with its own LDAP servers, web servers, and resources that move the task force when the communication bandwidth and delay to servers in those existing information infrastructures become bottlenecks. A user s AC can be stored at a central repository of the taskforce with the agency.s local administrator having control only over the AC.s of the users belonging to that agency or locally at each agency that defines his role within that agency. A user s privileges are the result of the association of the user with a particular agency. When a user s privileges are required to be revoked, all the agencies must be notified of the event, to prevent unauthorized access to the resources of the agency. Trust relationship between organizations determines where the AC s are stored. In our approach all the privileges granted by various agencies to a user are stored in the organization the user originally belongs to and the user s privileges will be checked with that organization on every attempt to access the resources. The following steps suggest a procedure for setting up a PMI for the task force. 1) The coordinator of the task force signed the attribute certificates of the members. 2) The attribute certificates belonging to the members of an agency are distributed and installed on the LDAP server of the agency. 3) The web servers and shared applications are configured to query the PMI for authorization and access control. TABL I SAMPL RBAC FIL FORMAT?xml version= 1.0 encoding= utf-8 standalone= yes?! ======= SIS rbac parsing example SIS ======= userrolespecification Role Teller /Role Group Info OU banking Share /OU /Group /SIS /userrolespecification are made based on these privileges. This information is stored in AC generated using administrative tool. LDAP Server: stores the user s information along with User Role Specification ACs and Delegated Role Specification AC s. Access Control Decision and nforcement: executes the function of authorization and inform the target if the user has the privileges or not. Resources: they may be web servers, database servers, or any other format of resources. Figure 3 shows the interaction of the various SIS components. The administrative tool generates X509 certificates and User Role Specification AC for the users participating in the secure information sharing service. The RBAC policy file passed to the administrative tool is used for embedding the policy information in the AC. The ACs generated by the administrative tool are stored in the LDAP server along with other information about the user. The user X509 certificates are installed in the his/her client application. Access Control Decision and nforcement (ACD) engine makes sure that the user has the required authorization privileges to access the resource. The user needs to submit his/her X509 certificate to the ACD in order to access a resource. The ACD verifies the user X509 certificate, and queries the LDAP server for the user AC. If the user has the required privileges to access the resource, access permission is granted. D. Organizational Information Sharing System Overview Our access control system is designed to support RBAC using X.509 PKIs and ACs. The authentication is implemented by PKI, and the authorization is implemented by AC. Role information is stored in User Role Specification AC s (see section Administration tool ). All the access control decisions are made based on authorization policies. They are written in XML and stored in ACs. ACs and their corresponding PKIs are all stored in LDAP servers [9]. In our current prototype implementation we have a simple RBAC policy specification file as shown in Table 1. An SIS system consists of the following components: Administration Tool: is used for creating key pair, PKIs, User Role Specification ACs. RBAC Policy file: specify the roles and what privileges the role can have on the resources. Access control decisions Fig. 3. User PKI RBAC Policy file Administration Tool Authenticate Access Control Decision and nforcement Interaction between various SIS components. Mapping Role Hierarchy to permissions User Role Specification AC Ldap Server Resource Mapping of Role Hierarchy of the organization to permissions for directory access is critical for enabling information
5 5 sharing and providing access restrictions. Figure 4 shows the mapping of user roles to directory access Permissions. USR3 has access permissions to USR3, USR2 and USR1 directories. The organizational role hierarchy information is contained in the configuration file of the apache. The module uses the Role information in the user AC along with role hierarchy information, to determine the access permissions to the requested web document. Figure 4 shows the mapping of role hierarchy to access permissions. User Role Priority Fig. 4. USRN USR4 USR3 USR1 USR1 User Role Mapping Role Hierarchy to Permissions F. Administration tool USRN USR4 USR3 USR1 USR1 Permissions OpenSSL [10] provides strong open source cryptographic library for X509, and SSL&TLS. Currently OpenSSL does not have any support for AC except for RFC 3281 AC s ASN.1 object definitions. We wrote the code for AC generation using the crypto library and ASN.1 object definitions in OpenSSL. There are two types of Attribute Certificates in our proposed architecture system: 1) User Role Specification attribute certificate which tells what privilege(s) a user has. It is used by the decision making service to make a decision to determine whether a user has access information or resources available in application services. 2) Delegated Role Specification attribute certificate which tells what privileges are given for a resource(s) by a user of higher authority. In the User Role Specification AC the issuer and signature values belong to that of Attribute Authority. In Delegated Role Specification AC the issuer and signature value belongs to the user who delegated the authority. To issue User Role Specification AC, the tool needs the AA s certificate and key, and user s certificate along with RBAC policy file. To issue Delegated Role Specification AC, the tool needs the delegating user s certificate and key, and user s certificate along with RBAC policy file specifying the authority delegated. In our prototype we adopt AC Pull model, so the role ACs are not given to users. The User Role specification and Delegated Role Specification ACs are all stored in LDAP servers. G. Access Permissions specification Format Currently there are no XML parsers that can parse XML data fast. This can create a bottleneck if the XML file is large. We can optimize parsing by parsing XML tags that are of interest to us. In the XML document shown below, some of the tags are repeated, e.g., Role, Group, OU. Hence, a rule syntax is needed to allow for selecting a particular set of tags in the rule set. Here is an example of a scheme that addresses this problem. To specify a rule based on Group value present in the second item tag within the first userrolespecification tag, the rule will be specified as sis:1.userrolespecification:2.ou. As another example, sis:1.userrolespecification:1: Group specifies a rule based on the Group tag present within the first UserRoleSpecification tag in the first sis tag. We use this method of representation for specifying access permissions. TABL II ACCSS PRMISSIONS SPCIFICATION FORMAT? xml version= 1.0 encoding= utf-8 standalone= yes?! ======= SIS rbac parsing example SIS ======= userrolespecification Role Manager /Role Group communication /Group OU Info Share /OU /userrolespecification userrolespecification Role TeamLeader Group /Role communication OU /Group banking /OU /SIS /userrolespecification H. Information Sharing among Multiple Agencies We implemented the Access Control Decision and nforcement (ACD) engine as an Apache [5] module. It is responsible for providing the authorization service for web requests between user and the requested target file(s). This framework separates authentication service, provided by ModSSL [7] from authorization service. Our prototype consists of following components: Initiator (e.g. a browser), Target (web server), Access Control Decision and nforcement (ACD) provided by the apache sis module. Figure 5 shows the control flow in ACD engine. Figure 6 shows the message flow between these components. The initiator submits secure web access request to the web server. Through SSL protocol the client and the web server are mutually authenticated through the exchange of their digital certificates. From the uri of the submitted HTTP request, the web server identifies that the corresponding directory contains special access control as specified in the httpd.conf configuration file. The corresponding directory section of the httpd.conf file contain the information port number, bind password of the LDAP server where the web server queries for the authorized permission on behalf of the client. Besides the LDAP server location, it also includes the specification of the access right associated with the role which will be contained in the LDAP query result. The web server extracts the client information from the subject field of the client certificate and submits them in the
6 6 Request from the Web Browser Forbidden Forbidden Forbidden No No No Apache SIS Module SSL Request Get Common Name (CN), Organization (O) from Client certficate Query Ldap Server get Attribute Certificate(s) Validate Attribute Certificate have privileges? Yes Ldap Server Serve Request Client Validates Server certificate C L I N T Client HLLO Client Certificate Client Key xchange Certificate Verify [Change Cipher Spec] Finished Server Hello Server Certificate Server Key xchange Certificate Request Server Hello Done [Change Cipher Spec] Finished HTTP Request Server parses the attribute List get the Attribute Certificate, validates the User for Privileges to requested Web Page Send Requested Web Page A P A C H S R V R Server validates Client certificate Server parses Client certificate and gets CN, DN Bind Request Search Request ( DN, Attribute List ) ( DN, Auth Type, Passwd ) Bind Success ( Base DN, Filter ) Search ntry L D A P S R V R Fig. 5. Control Flow in Access Control Decision and nforcement engine Fig. 6. Message Flow between the components LDAP query request to the LDAP sever. The LDAP server retrieves the corresponding client s attribute certificate and returns it to the web server. The web server translates the role containing in the attribute certificate into the related access right. If the command contains in the HTTP request does not match with the resulting accessing right, the request will be rejected. For example, if this is a POST command while the role of the client only has read access right, the request will be rejected. IV. XPRIMNTAL RSULTS In this section, we present the details of our prototype and its performance. A. Prototype implementation We developed a Secure Information Sharing system prototype for supporting a joint task force from multiple agencies with web based approach. Authentication was provided for Apache (v ) web server using third party module Mod SSL (v ), which uses OpenSSL (v 0.9.7d) package for providing SSL & TLS. The Web server is configured to validate the clients, by requesting for client certificates. LDAP module [apacheldap] for Apache was enhanced to provide ACD functionality. Attribute Certificate s attribute definitions was added to inetorgperson.schema in OpenL- DAP (v ) [11]. attributecertificateattribute attribute is added to inetorgperson objectclass in inetorgperson.schema file. Table 3 below shows the AC attribute definition. OpenSSL libraries were also used for generating X509 certificates. TABL III ATTRIBUTCRTIFICATATTRIBUT DFINITION [11] # attribute certificate attribute definition attributetype ( NAM attributecertificateattribute DSC A binary attribute certificate QUALITY octetstringmatch SYNTAX ) B. xperimental setup We set up a testbed to simulate the coordination among four different agencies. The four different agencies shared a similar Information Tree (DIT) shown in Figure 7. ach agency runs a SIS node which is installed with an OpenLDAP server and an Apache web server with sis module. The operating systems are Linux Redhat 8.0 or 9.0. Netscape and Internet xplorer browsers were used as clients. ach SIS node is a HP Kayak machine (PII) with 233MHz, 96MB RAM, and 10 Mb thernet connection. Figure 8 shows the multi-agency testbed. The following steps take place for a user (alpha-sis-canada) in organization sis-canada.csnet.edu to retrieve a web document from a web server located in sis-nissc.csnet.edu 1) alpha-sis-canada sends a secure web request to sisnissc.csnet.edu. sis-nissc.csnet.edu validates alpha-siscanada s certificate for authentication. 2) If the certificate is valid, sis-nissc.csnet.edu uses the subject (DN) in the certificate, to establish connection with the LDAP server on sis-canada, and retrieves his AC. 3) sis-nissc.csnet.edu validates alpha-sis-canada s AC and
7 7 dc=sis-agencyname, dc=edu ou=coordinationxercise ou=research TABL IV PRFORMANC RSULTS IN A MULTIPL AGNCY SCNARIO client-server LDAP access AC retrieval time (ms) and validation time (ms) sis-canada-sis-nissc.csnet.edu sis-canada-sis-connecticut.csnet.edu sis-canada-sis-newjersey.csnet.edu alpha-sis-agencyname Fig. 7. LDAP DIT Format at each agency beta-sis-agencyname psilon-sis-agencyname checks if alpha-sis-canada has the right privileges. The coordinationxercise group is allowed to retrieve data from sis-nissc.csnet.edu 4) sis-nissc.csnet.edu returns web documents back to alphasis-canada using the secure communication channel. LDAP Server sis-connecticut.csnet.uccs.edu sis-nissc.csnet.uccs.edu Internet LDAP Server sis-canada.csnet.uccs.edu 2 Internet Internet 3 alpha-sis-canada 4 1 Internet sis-newjersy.csnet.uccs.edu LDAP Server support the AC attribute definitions with the desirable object class. An older version of OpenLDAP (2.0.27) was enhanced to support attribute certificate using inetorgperson object class. Hope future OpenLDAP version will be able to support AC more easily. Some servers such as Java-based Tomcat web server and J2 application server have already adopted role based access control and can be easily modified to interact with the proposed privilege management infrastructure based on attribute certificates. Other web servers or applications such as Apache may require additional instrumentation to interact with LDAP-based PMI and to implement the access control related to specific roles. Our implementation of LDAP-sis module for the Apache server provides a glimpse of what is required to modify a legacy information system component and suggests the need for a well defined API and protocol for the servers and applications to interact with the PKI/PMI of an SIS system. Our current SIS prototype only supports the passive secure web accesses. We are currently working on techniques and tools for supporting a large scale secure notification system where urgent information can reach members of a joint task force in a timely and secure manner with the option of collecting acknowledgments and replies. The other related task is to track and protect the distributed sensitive documents. Policy specification is critical in an information sharing environment. We plan to evaluate if and how a policy specification language like extensible Access Control Markup Language, can be used for specifying RBAC policies. It is important to examine how digital rights and attribute certificates can work together for monitoring malicious activities on access violations by a client. Fig. 8. LDAP Server Web Server Access Control Allow Group: coordinationxercise Deny others multi-agency prototype testbed of SIS C. Performance Results Table 4 show the performance results of sis-module multiple agency scenarios. V. LSSONS LARNT AND FUTUR DIRCTIONS We were not able to store attribute certificates in the current stable versions of OpenLDAP (2.2.15) due to the lack of VI. CONCLUSION We discussed the issues involved with the design and rapid deployment of large scale secure information sharing systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up PKI and PMI quickly for the multi-agency SIS systems. A multi-agency SIS testbed based on LDAP servers and web servers was built to explore the use of the attribute certificate, public key digital certificate, and role-base access control for secure access and efficient authorization. LDAP servers were enhanced to accept attribute certificate. The LDAP module for the apache web server was extended to submit LDAP query based on the subject field of the client certificate, and to authorize the web access based on the attribute certificate return from a LDAP server. Performance of the prototype shows that the techniques and tools developed can rapidly set up the public key infrastructure and privilege management infrastructure for a large scale
8 8 multi-agency, web-based, secure information sharing system and support secure web access based on the effective rolebase access control and authorization. They can be used to support the critical information and communication needs of a joint task force assembled for unexpected natural disasters, nuclear/chemical accidents, or terrorist attacks. ACKNOWLDGMNT The authors would like to thank AFOSR and Dr. Bill Ayen of NISSC for sponsoring this project. We appreciate the helps from PRMIS, OpenSSL and OpenLDAP groups for answering questions and assisting us in implementing the attribute certificate. This material is based on research sponsored by the Air Force Research Laboratory, under agreement number F The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Air Force Research Laboratory or the U.S. Government. RFRNCS [1] CHADWICK, D. W., AND OTNKO, A. Rbac policies in xml for x.509 based privilege management. In Int. Conf. On Information Security (2002), pp [2] CHADWICK, D. W., AND OTNKO, A. The permis x.509 role based privilege management infrastructure. Future Gener. Comput. Syst. 19, 2 (2003), [3] D. FRRAIOLO, J. C., AND KUHN, D. R. Role-based access control: Features and motivations. Computer Security Applications Conference (1995), [4] FRRAIOLO, D., AND KUHN., D. R. Role-based access control. 15th NIST-NCSC National Computer Security Conference (1992), [5] JAKARTA [6] JAVIR LOPZ, ANTONIO MANA, J. J. O. J. M. T., AND YAGU, M. I. Integrating pmi services in corba applications. Comput. Stand. Interfaces 25, 4 (2003), [7] MODSSL [8] NIST. Role-based access control, [9] OPNLDAP. The open source lightweight directory access protocol (ldap), [10] OPNSSL. The open source toolkit for ssl/tls., [11] PRMIS [12] R. SANDHU,. J. COYN, H. L. F., AND YOUMAN., C.. Role-based access control models. I Computer 29 (1996), [13] S. FARRLL, R. H. An internet attribute certificate profile for authorization, [14] STRN., D. F. A tcb subset for integrity and role-based access control. 15th NIST-NCSC National Computer Security Conference NIST/NSA (1992). [15] THOMPSON, M. R., SSIARI, A., AND MUDUMBAI, S. Certificatebased authorization policy in a pki environment. ACM Trans. Inf. Syst. Secur. 6, 4 (2003), [16] VON SOLMS, S. H., AND VAN DR MRW, I. The management of computer security profiles using a role-oriented approach. Comput. Secur. 13, 9 (1994),
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
Implement Role-Based Access Control with Attribute Certificates
Forschungsbericht Nr. 03-5 Implement Role-Based Access Control with Attribute Certificates Wei Zhou, Christoph Meinel Forschungsgruppe Institut für Telematik FB IV-Informatik Universität Trier, 54286,
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.
Lecture 13 Public Key Distribution (certification) 1 PK-based Needham-Schroeder TTP 1. A, B 4. B, A 2. {PKb, B}SKT B}SKs 5. {PK a, A} SKT SKs A 3. [N a, A] PKb 6. [N a, N b ] PKa 7. [N b ] PKb B Here,
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
X.500 and LDAP Page 1 of 8
X.500 and LDAP Page 1 of 8 Introduction OCLC has completed its investigation of the two proposed electronic access protocols for the ILL Policies Directory. The first is X.500, a directory protocol standard
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : http://www.urec.cnrs.fr/igc/doc/datagrid-fr.policy.pdf Old versions Version 0.2 :
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Planning LDAP Integration with EMC Documentum Content Server and Frequently Asked Questions
EMC Documentum Content Server and Frequently Asked Questions Applied Technology Abstract This white paper details various aspects of planning LDAP synchronization with EMC Documentum Content Server. This
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 [email protected]
An LDAP/X.500 based distributed PGP Keyserver
An LDAP/X.500 based distributed PGP Keyserver First PGP Keyserver Manager Symposium 22.-23. May 2000, Utrecht Peter Gietz [email protected] Agenda PKI and Directory X.500 LDAP PGP Keyserver
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector
ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0
ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led
Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led Course Description During this five-day course, students will learn how to design an Active
prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to
If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system. BY THORSTEN SCHERF symmetric cryptography provides a powerful and convenient means for
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China [email protected] Abstract
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Role-Based Access Control (RBAC)
CIS/CSE 785: Computer Security (Syracuse University) RBAC: 1 1 Motivation Role-Based Access Control (RBAC) With many capabilities and privileges in a system, it is difficult to manage them, such as assigning
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
How to Design and Create Your Own Custom Ext Rep
Combinatorial Block Designs 2009-04-15 Outline Project Intro External Representation Design Database System Deployment System Overview Conclusions 1. Since the project is a specific application in Combinatorial
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Service Description. 3SKey. Connectivity
Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey
The CVS-Server Case Study: A Formalized Security Architecture
The CVS-Server Case Study: A Formalized Security Architecture Extended Abstract Achim D. Brucker, Frank Rittinger, and Burkhart Wolff {brucker,rittinge,wolff}@informatik.uni-freiburg.de 1 Introduction
UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION
UNDERSTANDING PKI: CONCEPTS, STANDARDS, AND DEPLOYMENT CONSIDERATIONS, 2ND EDITION Foreword. Preface. About the Authors. I. CONCEPTS. 1. Introduction. 2. Public-Key Cryptography. Symmetric versus Asymmetric
HTTP Reverse Proxy Scenarios
Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
A PKI case study: Implementing the Server-based Certificate Validation Protocol
54 ISBN: 978-960-474-048-2 A PKI case study: Implementing the Server-based Certificate Validation Protocol MARIUS MARIAN University of Craiova Department of Automation ROMANIA [email protected] EUGEN
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004
Certification Path Processing in the Tumbleweed Validation Authority Product Line Federal Bridge CA Meeting 10/14/2004 Stefan Kotes, Engineering Manager Agenda Tumbleweed company overview Certification
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
Configuring Apache Web Server for x509 User Authentication
Configuring Apache Web Server for x509 User Authentication Configuring Apache Web Server for x509 User Authentication Table of Contents 1.Introduction...1 2.Scenario...2 3. Configuring Active Directory...
How to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 28.07.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
How To Manage A Password Protected Digital Id On A Microsoft Pc Or Macbook (Windows) With A Password Safehouse (Windows 7) On A Pc Or Ipad (Windows 8) On An Ipad Or Macintosh (Windows 9)
Overview November, 2006 Copyright 2006 Entrust. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. All other Entrust product names and service names are
Directory Integration in LANDesk Management Suite
Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer
CA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
Designing a Windows Server 2008 Active Directory Infrastructure and Services
Course Code: M6436 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Windows Server 2008 Active Directory Infrastructure and Services Overview During this five-day course, delegates
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Technical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition. written by Dmitry Sotnikov, Aelita Software.
Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition written by Dmitry Sotnikov, Aelita Software White Paper Abstract This paper discusses how to select the optimal design
A Generic Database Web Service
A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University
White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
Grid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
SOFTWARE BEST PRACTICES
1 of 7 Abstract MKS Integrity Server LDAP (Lightweight Directory Access Protocol) implementations vary depending on the environment they are being placed into. The configuration of the corporate LDAP implementation
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
