• Title/Summary/Keyword: eXtensible Access Control Markup Language

Search Result 8, Processing Time 0.025 seconds

ENTERPRISE WIDE CENTRALIZED APPLICATION LEVEL ACCESS CONTROL USING XACML

  • Shaikh, Riaz A.;Rajput, Saeed;Zaidi, S.M.H.;Sharif, Kashif
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.62-67
    • /
    • 2005
  • In traditional approach, enterprise-wide consistent security policy enforcement for applications is very difficult task. Therefore, industry is now moving towards new unified enterprise application security concept that consist of centralized authentication and authorization mechanism. The eXtensible Access Control Markup Language (XACML); an XML-based standard defined by OASIS, is most suitable choice which can support centralized, role based, context aware access control mechanism. It is designed to provide universal standard for writing authorization policies and access control request/response language for managing access to the resources. This paper includes a brief overview on XACML and discusses its benefits, limitations and a data flow process. We propose a new generic access control architecture that supports enterprise wide centralized application level access control mechanism using XACML. The other benefits which can be achieved through this architecture are, reduce adnministration cost and complexity, support of heterogeneous computing platforms, centralized monitoring system, automatic fail over, scalability and availability, open standard based solution and secure communication.

  • PDF

Access Control for XML Documents Using Extended RBAC (확장된 RBAC를 이용한 XML문서에 대한 접근제어)

  • Kim, Jong-Hun;Ban, Yong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.869-881
    • /
    • 2005
  • XML(eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Internet. XML documents contain information of different sensitivity degrees, so that XML Document must selectively shared by user communities. There is thus the need for models and mechanisms enabling the specification and enforcement of access control policies for XML documents. Mechanisms are also required enabling a secure and selective dissemination of documents to users, according to the authorizations which the users have. In this paper, we give an account of access control model and mechanisms, which XML documents can be securely protected in web environments. We make RBAC Based access Control polices to the problem of secure and selective access of XML documents. The proposed model and mechanism guarantee that the secure use for XML documents through definition of authority for element, attribute, link within XML document as well as XML document.

  • PDF

RDB-based XML Access Control Model with XML Tree Levels (XML 트리 레벨을 고려한 관계형 데이터베이스 기반의 XML 접근 제어 모델)

  • Kim, Jin-Hyung;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.129-145
    • /
    • 2009
  • As the secure distribution and sharing of information over the World Wide Web becomes increasingly important, the needs for flexible and efficient support of access control systems naturally arise. Since the eXtensible Markup Language (XML) is emerging as the de-facto standard format of the Internet era for storing and exchanging information, there have been recently, many proposals to extend the XML model to incorporate security aspects. To the lesser or greater extent, however, such proposals neglect the fact that the data for XML documents will most likely reside in relational databases, and consequently do not utilize various security models proposed for and implemented in relational databases. In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases considering object perspective. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database, (3) Data are stored in relational databases, (4) Security check and query evaluation are also done in relational databases, and (5) Controlling access control is executed considering XML tree levels

  • PDF

A Study of the PMI-based XML Access Control Model in Consideration of the Features of the Public Organization (공공기관의 특성을 고려한 PMI기반의 XML 접근제어 모델에 관한 연구)

  • Cho, Chang-Hee;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.173-186
    • /
    • 2006
  • The local public organizations, to secure the Confidentiality, Integrity, Authentication and Non-Repudiation of cyber administrative environment is giving it a try to consolidate the official documents among them by standardizing all the documents into XML formats together with the establishment of the GPKI(Government Public Key Infrastructure). The Authentication System based on the PKI(Public Key Infrastructure) used by the GPKI, however, provides only the simple User Authentication and thus it results in the difficulty in managing the position, task, role information of various users required under the applied task environment of public organizations. It also has a limitation of not supporting the detailed access control with respect to the XML-based public documents.In order to solve these issues, this study has analyzed the security problems of Authentication and access control system used by the public organizations and has drawn the means of troubleshoot based on the analysis results through the scenario and most importantly it suggests the access control model applied with PMI and SAML and XACML to solve the located problem.

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.

A Study on Security Models Access Control XML Document for Performance RBAC (RBAC 기법의 성능을 고려한 XML 문서 접근제어 보안모델에 관한연구)

  • Kim, Moon-Seok;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1226-1229
    • /
    • 2007
  • XML(eXtensible Markup Language)은 문서구조나 내용, 스타일의 자유로운 표현, 웹상에서 구조화된 문서의 전송이 가능하도록 설계된 표준 마크업 언어로, HTML에 비해 인터넷상에서의 정보 및 문서교환, 정보 검색 둥 이 편리한 장점을 갖는다. 그러나 XML 데이터가 방대해지고 복잡해짐에 따라 접근제어 정책을 규정하고 수행하기 위한 모델과 메커니즘의 필요에 따라 RBAC를 기반으로 하는 모델과 메커니즘에 대한 연구가 이루어지고 있다. 그러나 기존 연구들은 개념적 모델들 위주로 연구의 초점이 되어 있어 실제 모델 구현 시 시간적 공간적 오버헤드가 발생하는 단점이 있다. 따라서 본 연구에서는 XML 문서의 RBAC 기법을 기반으로 하는 노드의 권한 정보를 가지고 있는 접근 권한 트리 모델을 제안하였다. 이를 이용하여 노드권한에 모든 정보를 저장하고 권한을 가지는 구성요소에 접근할 경우나 권한을 추가로 부여하는 경우에 XML 엘리먼트, 속성, 링크 등의 세부요소에 대한 권한 체크 시간을 감소시켜 사용자에게 빠른 뷰를 제공할 수 있는 성능이 우수한 모델을 제시 하고자 한다.

  • PDF

A Study of the XML-based Access Control Model for the public organization (공공기관을 위한 XML기반의 접근제어 모델에 관한 연구)

  • Jeong, Sung-Woo;Park, Jae-Won;Kang, Cheol-Oh;Won, Jong-Jin;Lee, Nam-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1229-1232
    • /
    • 2005
  • 국내 공공기관에서는 사이버 행정환경의 기밀성, 무결성, 신원확인, 부인방지등을 보장하기 위하여 행정전자서명인증체계(GPKI:Government Public Key Infrastructure)의 구축과 함께 모든 문서를 XML형태로 표준화하여 공공기관간의 문서를 통합하기 위한 시도를 하고 있다. 하지만 행정전자서명인증체계에서 사용하는 공개키기반(PKI)을 연동한 인증체계는 단순한 사용자 인증만을 제공하여, 공공기관의 응용업무 환경에서 요구되는 다양한 사용자의 직위, 직무, 역할정보 등의 관리가 어려우며 XML형태의 공공문서에 대한 상세한 접근제어를 지원하지 못하는 한계점이 있다. 이러한 한계점을 해결하기 위하여 본 논문에서는 공공기관에서 사용하는 인증 및 접근제어 시스템의 가상시나리오를 통하여 보안문제점을 도출하고 분석한 후에 이를 근거로 공공기관의 보안 문제점을 해결할 수 있는 보안기술인 PMI(Privilege Management Infrastructure)와 XACML(eXtensible Access Control Markup Language)을 연동한 접근제어모델을 제안하였다..

  • PDF

Extension of Legacy Gear Design Systems Using XML and XSLT in a Distributed Design Environment (분산 설계 환경 하에서 XML과 XSLT를 이용한 레거시 기어 설계 시스템의 확장)

  • 정태형;박승현
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.11 no.4
    • /
    • pp.19-25
    • /
    • 2002
  • As computer-related technologies have been developed, legacy design systems have not been appropriate far new computing environment. It is necessary that most of them are either modified or newly developed. However, these activities require quite much amount of cost and time. This paper presents a method of extending legacy design systems to the internet without any modification using XML and XSLT. We have been extended legacy systems in the two viewpoints. First, an XML document has been defined to present the input information of a legacy system which is executed on the consol environment - MS DOS, for example. Also, an XSLT document has been generated to transform an XML document to the input document of the legacy system An XML document is transformed to the input document by XSLT processor according to the transformation rules defined in the XSLT document. This technique to generate input documents is independent to the platform type and facilitates to link legacy systems to other systems. Second, a legacy system controller has been made to control a legacy system and developed a web service to extend it and its controller. The legacy system controller operates it automatically. The web service provides its functions to other systems via internet. We have applied the developed methodologies to the legacy gear design system 조ich calculates AGMA gear rating md made AGMA gem rating web service.