123 research outputs found

    Distributed credential chain discovery in trust management

    Get PDF

    Risk management for distributed authorization

    Full text link

    How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks, Journal of Telecommunications and Information Technology, 2012, nr 4

    Get PDF
    Trust plays an important role in human life environments. That is why the researchers has been focusing on it for a long time. It allows us to delegate tasks and decisions to an appropriate person. In social sciences trust between humans was studied, but it also was analyzed in economic transactions. A lot of computer scientists from different areas, like security, semantic web, electronic commerce, social networks tried to transfer this concept to their domains. Trust is an essential factor in any kind of network, whether social or computer. Wireless sensor networks (WSN) are characterized by severely constrained resources, they have limited power supplies, low transmission bandwidth, small memory sizes and limited energy, therefore security techniques used in traditional wired networks cannot be adopted directly. Some effort has been expended in this fields, but the concept of trust is defined in slightly different ways by different researchers. In this paper we will show how the family of Role-based Trust management languages (RT) can be used in WSN. RT is used for representing security policies and credentials in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities

    Hierarchical Group and Attribute-Based Access Control: Incorporating Hierarchical Groups and Delegation into Attribute-Based Access Control

    Get PDF
    Attribute-Based Access Control (ABAC) is a promising alternative to traditional models of access control (i.e. Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access control (RBAC)) that has drawn attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large-scale adoption is still in its infancy. The relatively recent popularity of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, etc. have been largely ignored or left to future work. This thesis seeks to aid in the adoption of ABAC by filling in several of these gaps. The core contribution of this work is the Hierarchical Group and Attribute-Based Access Control (HGABAC) model, a novel formal model of ABAC which introduces the concept of hierarchical user and object attribute groups to ABAC. It is shown that HGABAC is capable of representing the traditional models of access control (MAC, DAC and RBAC) using this group hierarchy and that in many cases it’s use simplifies both attribute and policy administration. HGABAC serves as the basis upon which extensions are built to incorporate delegation into ABAC. Several potential strategies for introducing delegation into ABAC are proposed, categorized into families and the trade-offs of each are examined. One such strategy is formalized into a new User-to-User Attribute Delegation model, built as an extension to the HGABAC model. Attribute Delegation enables users to delegate a subset of their attributes to other users in an off-line manner (not requiring connecting to a third party). Finally, a supporting architecture for HGABAC is detailed including descriptions of services, high-level communication protocols and a new low-level attribute certificate format for exchanging user and connection attributes between independent services. Particular emphasis is placed on ensuring support for federated and distributed systems. Critical components of the architecture are implemented and evaluated with promising preliminary results. It is hoped that the contributions in this research will further the acceptance of ABAC in both academia and industry by solving the problem of delegation as well as simplifying administration and policy authoring through the introduction of hierarchical user groups

    Learning by doing on the EGEE GRID and first performance analysis of CODESA-3D multirun submission

    Get PDF
    The project TEMA (Training on Environmental Modelling and Applications) is a CRS4 training initiative in the field of computational hydrology and grid computing (Jan-Sept, 2006). The personnel involved were Fabrizio Murgia (trainee) and Giuditta Lecca (tutor). The objectives of the project were: " To aquire specialized skills about grid computing with special emphasis on computational sub-surface hydrology; " To develop and test software procedures to run Monte Carlo simulations on the EGEE production grid; " To produce a technical report and some seminars about grid computing. The aquired competences and skills will be used in the ongoing projects GRIDA3, CyberSAR and DEGREE

    A survey on information security threats and solutions for Machine to Machine (M2M) communications

    Get PDF
    Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. © 2017 Elsevier Inc

    Formal Description of Web Services for Expressive Matchmaking

    Get PDF

    C-business et urbanisation d'entreprise

    Get PDF
    Les évolutions permanentes du marché ont forcé la plupart des entreprises à se focaliser sur les processus liés à leur coeur de métier. Ce recentrage les conduit alors soit à externaliser certaines parties de leurs processus, soit former temporairement une association avec d autres partenaires. Ces scénarios de collaboration imposent plusieurs contraintes sur la conception et l organisation du système d information à fin de le rendre facilement adaptable pour suivre les changements au niveau d organisation. Pour que le système d information soit facilement adaptable il est possible de restructurer le système d information en respectant les principes de l urbanisation du système d information couplé par une architecture orienté service, toute fois, cette organisation conduit à des systèmes assez rigides ne donnant pas réellement les capacités d initier des processus collaboratifs. Or, la collaboration impose de prendre en compte les contraintes de sécurité car l approche traditionnelle d urbanisation ne prend pas en considération la possibilité de collaboration et forme des îlots de sécurité ce qui s oppose à la nature transversale de la sécurité. En plus,dans un modèle orienté services, les applications distribuées sur plusieurs site ont peu ou pas de visibilité en matière de l information nécessaires pour assurer la sécurité au nouveau globale. C est dans ce contexte que nous avons proposé d adopter une démarche d urbanisation d entreprise qui promeut une organisation transversale du système de production de l entreprise qui permet une construction incrémentale des processus collaboratifs. Nous sommes parvenus à spécifier un modèle de service industriel construit par regroupement de toutes les fonctions nécessaires autour de la fabrication du produit. Ensuite, nous nous somme proposé de construire un middleware supportant ces services industriels. Cela induit d ajouter un niveau sémantique capable de gérer les propriétés fonctionnelles et non fonctionnelles (qualité de service et sécurité) aux bus de services traditionnels (ESB). Dans le cadre du projet ANR SEMEUSE visant à doter un ESB Open source (PETALS) d un niveau sémantique, notre contribution a plus particulièrement portée sur la spécification et la mise en oeuvre des composants permettant d intégrer de manière contextuelle les politiques de sécuritéMarket evolution has lead most of the enterprise to focus on their core business while setting outsourcing and collaborative strategies to be able to propose the best product-service offers. This Collaborative Business environment challenges Information System (IS) re-organisation to set agile, reactive and interoperable IT supports. To fulfil these requirements, one can reorganise the information system according to the urbanisation paradigm. Coupled to Service Oriented Architecture, this approach provides interoperable information systems. Nevertheless, traditional urbanization strategies lead to a partitioned and rather rigid IS organization aligned on the company s functional structure, which hinders initiating collaborative production processes, since production process is transversal and bypasses all enterprise business areas. To overcome these limits, we propose to adopt a new urbanization strategy that combines the transversal production logic with a service orientation to allow incremental production process building, based on goals to be reached. Despite of the advantages of the collaboration, in the dynamic collaboration scenarios, lack of trust can be a braking force while developing collaborative strategies. To this end, we proposed to integrate security needs and constraints into the definitions of business processes, organizational structure and technical components. Hence, the architecture we propose to implement our enterprise urbanization approach is based on a service-oriented model. We extend the traditional IT service to capture semantics associated to the industrial activity so that an industrial service model is proposed. Then security requirements are added in this model to govern access to different interfaces in a composite service. The implementation of this architecture is achieved using an industrial service bus by adding a security module extended with semantic layer on the top of PEtALS , an open source ESBVILLEURBANNE-DOC'INSA-Bib. elec. (692669901) / SudocSudocFranceF
    corecore