CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Novel Access Control Mechanism based on Key-Chain-Web Model using Authorization Contexts

by Vibhaj Rajan, Subhash Chandra Patel, Ravi Shankar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 13
Year of Publication: 2012
Authors: Vibhaj Rajan, Subhash Chandra Patel, Ravi Shankar Singh
10.5120/7829-1017

Vibhaj Rajan, Subhash Chandra Patel, Ravi Shankar Singh . A Novel Access Control Mechanism based on Key-Chain-Web Model using Authorization Contexts. International Journal of Computer Applications. 50, 13 ( July 2012), 6-9. DOI=10.5120/7829-1017

@article{ 10.5120/7829-1017,
author = { Vibhaj Rajan, Subhash Chandra Patel, Ravi Shankar Singh },
title = { A Novel Access Control Mechanism based on Key-Chain-Web Model using Authorization Contexts },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 13 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number13/7829-1017/ },
doi = { 10.5120/7829-1017 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:48:10.665984+05:30
%A Vibhaj Rajan
%A Subhash Chandra Patel
%A Ravi Shankar Singh
%T A Novel Access Control Mechanism based on Key-Chain-Web Model using Authorization Contexts
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 13
%P 6-9
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes a number of useful improvements to the Key-Chain-Web access control mechanism which expands the usability of the mechanism in different scenarios. The improved services shall demonstrate the flexible and adaptive nature of the mechanism achieved through the use of relationships within co-ordination among resources in cloud and grid systems to provide access control. The proposed additions are very easy to implement and augments the fundamental principle of co-ordination based access control inherent in it. The proposed services are generic in nature to suit the access control needs of any distributed environment.

References
  1. V. Rajan and R. S. Singh, May 2012, "A mechanism for flexible access control during co-ordinated resource sharing in enterprise grids", IEEE Explore, pp. 341-345.
  2. R. S. Sandhu and P. Samarati, September 1994, Access Control Principles and Practice, IEEE Communications Magazine, pp. 40-48.
  3. R. S. Sindhu et. al. , February 1996, "Role based access control models", IEEE Computer, pp38-47
  4. AccessGuard Framework, 2012, https://github. com/tr4n2uil/cirrusbolt/tree/master/php/accessguard
  5. Chiara Bodei et. al. , 1999, "Static analysis of process for no red-up and no write-down", LNCS 1578, pp. 120-134, Springer
  6. M. Backes, J. Camenisch and D. Sommer, November 2005, "Anonymous yet accountable access control", ACM WPES '05
  7. X. 509 Certificates, ITU-T Recommendation, ISO/IEC 9594-8http://www. itu. int/rec/T-REC-X. 509/en
  8. B. Clifford Neuman and Theodore Ts'o, September 1994, "Kerberos: An Authentication Service for Computer Networks," IEEE Communications, vol. 32 (9), pp. 33–38.
  9. D. M. Kristol, November 2001, "HTTP Cookies: Standards, privacy, and politics", ACM Transactions on Internet Technology, pp. 151-198
  10. D. Recordon and D. Reed, 2006, "OpenID 2. 0: a platform for user-centric identity management", Proceedings of the second ACM workshop on Digital identity management, pp. 11-16
  11. CirrusBolt, 2011, Service Computing Platform Foundation Engine, https://github. com/tr4n2uil/cirrusbolt
  12. TPR Executive, 2012, Training and Placement Portal, https://github. com/tr4n2uil/tprexecutive
Index Terms

Computer Science
Information Sciences

Keywords

access control key-chain-web cloud grid systems enterprise software coordination