Title :
Using attribute certificates with mobile policies in electronic commerce applications
Author :
Doshi, Vinti ; Fay, Amgad ; Jajodia, Sushil ; MacLean, Roswitha
Author_Institution :
MITRE Corp., McLean, VA, USA
Abstract :
Many electronic commerce applications, including those developed for business-to-consumer (B2C) and business-to-business (B2B) uses, require operations in computing environments that are truly distributed. That is, users can request data access from multiple locations within a distributed computing system. To complicate this type of operation, however, data can be distributed and represented in multiple forms. As a result, system administrators are encountering increasing difficulty in developing and managing application-specific policies for users and data. A multi-tier (N-tier) architecture can provide a powerful solution for meeting the diverse needs of the electronic commerce applications. However, a drawback to multi-tier architectures is that they require that a user´s credentials and the policy-to-data mapping context must be available in the middle tier of the system architecture. This paper addresses the management of users and data by presenting a framework for combining attribute certificates with a mobile policy for effective application-specific control specification and administration in a distributed computing environment. Attribute certificates provide mobility to credentials and also provide fine-grained information about security principles. A mobile policy allows application-specific policies to move along with the data to other elements of the distributed computing system. We propose a high-level definition language to specify policies that are application-specific and mobile, and present an algorithm for enforcing attribute-based mobile policies
Keywords :
certification; electronic commerce; message authentication; mobile computing; specification languages; application-specific control specification; application-specific policies; attribute certificates; business-to-business applications; business-to-consumer applications; data access requests; data management; distributed computing environments; distributed data representation; electronic commerce applications; fine-grained information; high-level definition language; middle tier; mobile policies; multi-tier architecture; policy-to-data mapping context; security principles; system administration; user credentials; user management; Access control; Authorization; Computer architecture; Data security; Databases; Distributed computing; Electronic commerce; Information security; Logic; Mobile computing;
Conference_Titel :
Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference
Conference_Location :
New Orleans, LA
Print_ISBN :
0-7695-0859-6
DOI :
10.1109/ACSAC.2000.898884