Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Novel Access Control Mechanism based on Key-Chain-Web Model using Authorization Contexts

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 13
Year of Publication: 2012
Authors:
Vibhaj Rajan
Subhash Chandra Patel
Ravi Shankar Singh
10.5120/7829-1017

Vibhaj Rajan, Subhash Chandra Patel and Ravi Shankar Singh. Article: A Novel Access Control Mechanism based on Key-Chain-Web Model using Authorization Contexts. International Journal of Computer Applications 50(13):6-9, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Vibhaj Rajan and Subhash Chandra Patel and Ravi Shankar Singh},
	title = {Article: A Novel Access Control Mechanism based on Key-Chain-Web Model using Authorization Contexts},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {13},
	pages = {6-9},
	month = {July},
	note = {Full text available}
}

Abstract

This paper proposes a number of useful improvements to the Key-Chain-Web access control mechanism which expands the usability of the mechanism in different scenarios. The improved services shall demonstrate the flexible and adaptive nature of the mechanism achieved through the use of relationships within co-ordination among resources in cloud and grid systems to provide access control. The proposed additions are very easy to implement and augments the fundamental principle of co-ordination based access control inherent in it. The proposed services are generic in nature to suit the access control needs of any distributed environment.

References

  • V. Rajan and R. S. Singh, May 2012, "A mechanism for flexible access control during co-ordinated resource sharing in enterprise grids", IEEE Explore, pp. 341-345.
  • R. S. Sandhu and P. Samarati, September 1994, Access Control Principles and Practice, IEEE Communications Magazine, pp. 40-48.
  • R. S. Sindhu et. al. , February 1996, "Role based access control models", IEEE Computer, pp38-47
  • AccessGuard Framework, 2012, https://github. com/tr4n2uil/cirrusbolt/tree/master/php/accessguard
  • Chiara Bodei et. al. , 1999, "Static analysis of process for no red-up and no write-down", LNCS 1578, pp. 120-134, Springer
  • M. Backes, J. Camenisch and D. Sommer, November 2005, "Anonymous yet accountable access control", ACM WPES '05
  • X. 509 Certificates, ITU-T Recommendation, ISO/IEC 9594-8http://www. itu. int/rec/T-REC-X. 509/en
  • B. Clifford Neuman and Theodore Ts'o, September 1994, "Kerberos: An Authentication Service for Computer Networks," IEEE Communications, vol. 32 (9), pp. 33–38.
  • D. M. Kristol, November 2001, "HTTP Cookies: Standards, privacy, and politics", ACM Transactions on Internet Technology, pp. 151-198
  • D. Recordon and D. Reed, 2006, "OpenID 2. 0: a platform for user-centric identity management", Proceedings of the second ACM workshop on Digital identity management, pp. 11-16
  • CirrusBolt, 2011, Service Computing Platform Foundation Engine, https://github. com/tr4n2uil/cirrusbolt
  • TPR Executive, 2012, Training and Placement Portal, https://github. com/tr4n2uil/tprexecutive