A Guanxi Shibboleth based security infrastructure for e-social science

Jie, Wei, Young, Alistair, Arshad, Junaid, Finch, June, Procter, Rob and Turner, Andy (2008) A Guanxi Shibboleth based security infrastructure for e-social science. In: International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2008), 12th IEEE International Enterprise Computing Conference (EDOC 2008), 15 September 2008, Munich, Germany.

[img]
Preview
PDF
A Guanxi Shibboleth based Security Infrastructure for e-Social Science.pdf - Accepted Version

Download (99kB) | Preview

Abstract

An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on interinstitutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architecture. In this paper, we propose a security infrastructure for e-social science based on the Guanxi Shibboleth. This security infrastructure presents two main features. Firstly, Guanxi Shibboleth is integrated into the user-friendly Sakai collaborative and learning environment which provides an ideal place for users to access a variety of federation resources in line with the Shibboleth authentication model. Secondly, PERMIS technology is used to enhance the authorization mechanisms thus enabling a policy-driven, role-based, fine-grained access control. As a result, the security infrastructure presents the advantages of Guanxi Shibboleth, PERMIS and Sakai, and it has been applied to e-Social Science application. We believe this security infrastructure provides a promising authentication and authorization solution for e-social science applications as well as applications in other domains.

Item Type: Conference or Workshop Item (Paper)
ISBN: 9780769537207
Identifier: 10.1109/EDOCW.2008.6
Additional Information: © 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Uncontrolled Keywords: Security, Authorization, Authentication, Access control, Protection, Access protocols, Collaboration, Public key, Scalability, Permission
Subjects: Computing
Depositing User: Vani Aul
Date Deposited: 18 Dec 2013 11:20
Last Modified: 01 Aug 2017 07:58
URI: http://repository.uwl.ac.uk/id/eprint/561

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu