DOC PREVIEW
UConn CSE 298/300 - Role-Based Security in a Distributed Resource Environment

This preview shows page 1-2-3-24-25-26 out of 26 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 26 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Role-Based Security in a Distributed Resource Environment*OverviewGoals of Our Research EffortSun’s JINI TechnologySun’s JINI Technology Key JINI Concepts and TermsSun’s JINI Technology Join, Lookup, and Service InvocationProposed Software Architecture for Role-Based SecuritySlide 8Security Resources and ServicesThe Services of the Role-Based Privilege ResourceThe Services of the Authorization-List ResourceThe Services of the Security Registration ResourceSecurity Client and Resource InteractionsClient Interactions and ProcessingTwo Experimental PrototypesExperimental Prototype One JINI Prototype of Role Based ApproachExperimental Prototype One Execution ProcessExperimental Prototype Two The Security Client PrototypeRecall Security Resources and ServicesExperimental Prototype Two Role-Based Privilege Resource & ServicesExperimental Prototype Two Authorization List Resource & ServicesExperimental Prototype Two Security Registration Resource & ServicesRelated WorkConclusionsFuture WorkSlide 26IFIP 2000-1Profs. Steven A. Demurjian and T.C. TingJ. Balthazar, H. Ren, and C. PhillipsComputer Science & Engineering Department191 Auditorium Road, Box U-155The University of ConnecticutStorrs, Connecticut 06269-3155http://www.engr.uconn.edu/[email protected] Role-Based Security in a Distributed Role-Based Security in a Distributed Resource Environment*Resource Environment*Dr. Paul BarrThe MITRE Corp145 Wyckoff RoadEatontown, New Jersey [email protected]*This work supported in part by a research contract from the Mitre Corporation (Eatontown, NJ) and a research grant from AFOSRIFIP 2000-2OverviewOverviewGoals of Our Research EffortGoals of Our Research EffortSun’s JINI TechnologySun’s JINI TechnologyA Software Architecture for Role-Based SecurityA Software Architecture for Role-Based SecurityProposed Software ArchitectureSecurity Resources and ServicesSecurity Client and Resource InteractionsClient Interactions and ProcessingExperimental Prototypes Experimental Prototypes JINI Prototype of Role Based ApproachSecurity Client PrototypeRelated WorkRelated WorkConclusions and Future WorkConclusions and Future WorkIFIP 2000-3Goals of Our Research EffortGoals of Our Research EffortIncorporation of Role-Based Approach within Incorporation of Role-Based Approach within Distributed Resource EnvironmentDistributed Resource EnvironmentHighly-Available Distributed Applications Constructed Using Middleware ToolsDemonstrate Use of JINI to Provide Selective Access of Clients to Resources Based on RolePropose Software Architecture and Role-Based Propose Software Architecture and Role-Based Security Model forSecurity Model forAuthorization of Clients Based on RoleAuthentication of Clients and ResourcesEnforcement so Clients Only Use Authorized Services (of Resource)Propose Security Solution for Distributed Propose Security Solution for Distributed Applications for Clients and Services (Resources)Applications for Clients and Services (Resources)IFIP 2000-4Sun’s JINI TechnologySun’s JINI TechnologyConstruct Distributed Applications Using JINI by Construct Distributed Applications Using JINI by Federating Groups of UsersResources Provide Services for UsersA A ResourceResource Provides a Set of Services for Use by Provides a Set of Services for Use by Clients (Users) and Other Resources (Services)Clients (Users) and Other Resources (Services)A A ServiceService is Similar to a Public Method is Similar to a Public MethodExportable - Analogous to APIAny Entity Utilized by Person or ProgramSamples Include:Computation, Persistent Store, Printer, SensorSoftware Filter, Real-Time Data SourceServices: Concrete Interfaces of ComponentsServices Register with Services Register with Lookup ServiceLookup ServiceIFIP 2000-5Sun’s JINI TechnologySun’s JINI TechnologyKey JINI Concepts and TermsKey JINI Concepts and TermsRegistrationRegistration of Services via of Services via Leasing MechanismLeasing MechanismResource Leases Services to Lookup ServiceResources Renew Services Prior to ExpirationIf not, Services Become UnavailableLookup Service Maintains RegistryServices as Available “Components”Leasing Supports High-AvailabilityLeasing Supports High-AvailabilityRegistration and Renewal ProcessUpon Failure, Services Removed from RegistryClients, Resources, Lookup Can Occupy Same or Clients, Resources, Lookup Can Occupy Same or Different Computing NodesDifferent Computing NodesIFIP 2000-6Sun’s JINI TechnologySun’s JINI TechnologyJoin, Lookup, and Service InvocationJoin, Lookup, and Service InvocationClientResourceService ObjectService AttributesLookup ServiceRequestServiceAddCourse(CSE900)ReturnServiceProxy toAddCourse( )JoinRegister & Lease Services CourseDB ClassContains Method AddCourse ( )1. Client Invokes AddCourse(CSE900) on Resource2. Resource Returns Status of InvocationService Invocation via Proxy by Transparent RMI CallService ObjectService AttributesRegistry of EntriesIFIP 2000-7Proposed Software ArchitectureProposed Software Architecturefor Role-Based Securityfor Role-Based SecurityMany Current Lookup ServicesMany Current Lookup ServicesSuccessfully Dictates Service UtilizationRequires Programmatic Solution for SecurityDoes Not Selectively and Dynamically Control Access Based on Client RoleSecurity of a Distributed Resource Should Selectively Security of a Distributed Resource Should Selectively and Dynamically Control Client Access to Services and Dynamically Control Client Access to Services Based on the RoleBased on the RoleOur ApproachOur ApproachDefine Dedicated Resources to Authorize, Authenticate, and Enforce Security by Role Proposed ResourcesRole-Based Privileges, Authorization List, Security RegistrationIFIP 2000-8Proposed Software ArchitectureProposed Software Architecturefor Role-Based Securityfor Role-Based SecurityResources Provide ServicesClients Using ServicesFigure 3.1: General Architecture of Clients and Resources.Role-BasedPrivilegesAuthorizationListSecurity RegistrationLegacyCOTSCOTSDatabaseDatabase LookupServiceLookupServiceJavaClientJavaClientLegacyClientDatabaseClientSoftwareAgentCOTSClientIFIP 2000-9Security Resources and ServicesSecurity Resources and ServicesRole-Based Privileges ResourceRole-Based Privileges ResourceDefine User-roleGrant/Revoke Access of Role to


View Full Document

UConn CSE 298/300 - Role-Based Security in a Distributed Resource Environment

Documents in this Course
Java Tool

Java Tool

58 pages

Load more
Download Role-Based Security in a Distributed Resource Environment
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Role-Based Security in a Distributed Resource Environment and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Role-Based Security in a Distributed Resource Environment 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?