...
首页> 外文期刊>Bell Labs technical journal >On Dynamic Access Control in Web 2.0 and Beyond: Trends and Technologies
【24h】

On Dynamic Access Control in Web 2.0 and Beyond: Trends and Technologies

机译:Web 2.0及更高版本中的动态访问控制:趋势和技术

获取原文
获取原文并翻译 | 示例

摘要

The Web in the Internet today—especially when it comes to the Internet of Things and cloud computing—is the Web of resources. A photo album, an appointment calendar, a telephone bill, a health record are all resource examples, listed here in the increasing order of expected privacy protection. A few properties of these resources define the roles of three major actors: The resources belong to their owner, they are hosted by the service provider, and they increasingly need to be shared (say, to support mash-up) with consumers. Owners authorize consumers' access to their resources, which providers then grant to the consumers upon authenticating them and checking for proper authorization. In the past, this was achieved by maintaining an access control list for each resource at the service provider. Typically, such a list specifies all consumers along with their privileges. Emerging trends in social networking and cloud computing require elasticity, or, in other words, the ability to grant resource access to new consumers on the fly. Naturally, this comes with ever-increasing requirements for privacy which dictate strong authentication of all actors involved as well as cryptographic protection of the involved communication sessions. We share the industry expectation that the technology that solves the above problem will be a major enabler for applications based on technologies that range from social networking, to video-on-demand, to health care, to smart metering, and—especially—to cloud computing. This paper reviews the state-of-the-art technologies, including the emerging Open Authorization Protocol (OAuth) 2.0, and presents our own solution in this space, which removes an intermediary and gives the owner of a resource immediate control over defining access to that resource.
机译:当今Internet中的Web,尤其是涉及物联网和云计算的Web,就是资源Web。相册,约会日历,电话费,健康记录都是资源示例,在此处按预期的隐私保护的升序排列。这些资源的一些属性定义了三个主要角色的角色:这些资源属于其所有者,由服务提供商托管,并且越来越需要与消费者共享(例如,支持混搭)。所有者授权消费者访问其资源,然后提供者在对用户进行身份验证并检查适当的授权后将其授予消费者。过去,这是通过在服务提供商处维护每个资源的访问控制列表来实现的。通常,这样的列表指定所有消费者及其特权。社交网络和云计算的新兴趋势需要弹性,或者换句话说,需要能够动态地向新消费者授予资源访问权限。自然,这带来了对隐私的不断增长的要求,该要求要求对所有参与人员进行严格的身份验证,并对涉及的通信会话进行密码保护。我们与业界一致认为,解决以上问题的技术将成为基于社交网络,视频点播,医疗保健,智能计量以及(尤其是)云技术的应用程序的主要推动力计算。本文回顾了最新技术,包括新兴的开放式授权协议(OAuth)2.0,并提出了我们在此领域的解决方案,该解决方案消除了中介,并为资源所有者提供了对定义访问权限的直接控制权。该资源。

著录项

  • 来源
    《Bell Labs technical journal 》 |2011年第2期| p.199-218| 共20页
  • 作者单位

    security and identity management in theAlcatel-Lucent Applications Software Group (ASG) Chief Technology Office (CTO);

    technical staff in the Alcatel-Lucent Applications Software;

    the Genesys products suite including integration with enterprise products;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号