Changes between Version 10 and Version 11 of SecurityIssuesFirstDay
- Timestamp:
- 2008/02/12 12:40:07 (17 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
SecurityIssuesFirstDay
v10 v11 6 6 == Motivation == 7 7 8 Security services enforce access control policies at all levels to provide secure authentication and communication over an open network. 9 10 * '''Resources protection:''' software (services, WFs, …) availability, computational resources (CPU, storage, …); data access restrictions 11 * '''Protection / Sharing of proprietary data''' (in a persistence system). 12 * '''Scheduling''': priority based system. 13 8 14 Scenary: Dynamic access control & secure management over federated resources. 9 15 [attachment:wiki:SecurityIssuesFirstDay:Fig-S1.JPG General security architecture] 16 17 18 19 == State of the art == 20 * Systems: Kerberos / GAS ... 21 [attachment:wiki:SecurityIssuesFirstDay:image002.gif Security roles graph] 10 22 11 23 Simplified use case: … … 15 27 · Services offering access to sensitive data should do additional authorisation decision requests to some Authorization Service that implements the Data Protection policies and governs the flow of private datasets. 16 28 17 18 19 20 * '''Resources protection:''' software (services, WFs, …) availability, computational resources (CPU, storage, …); data access restrictions 21 * '''Protection / Sharing of proprietary data''' (in a persistence system). 22 * '''Scheduling''': priority based system. 23 Security services enforce access control policies at all levels to provide secure authentication and communication over an open network. 24 25 == State of the art == 26 * Systems: Kerberos / GAS ... 27 [attachment:wiki:SecurityIssuesFirstDay:image002.gif Security roles graph] 29 [attachment:wiki:SecurityIssuesFirstDay:Fig-S2.JPG MyProxy delegation example] 28 30 29 31 == Discussion space == … … 32 34 * Authentication & delegation: Authentication, both of end-user and of infrastructure components, could based on X509 digital certificates. This proven technology is commonly used, for example when connecting to a secure website (https). Certificates are managed through a Public Key Infrastructure (PKI), which deals with the secure creation, validation and revocation of certificates. 33 35 34 [attachment:wiki:SecurityIssuesFirstDay:Fig-S2.JPG MyProxy delegation example]35 36 36 37 * WFs concerns