Jie, Wei ORCID: https://orcid.org/0000-0002-5392-0009, Young, Alistair, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Finch, June, Procter, Rob and Turner, Andy (2008) A Guanxi Shibboleth based security infrastructure for e-social science. In: International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2008), 12th IEEE International Enterprise Computing Conference (EDOC 2008), 15 September 2008, Munich, Germany.
Preview |
PDF
A Guanxi Shibboleth based Security Infrastructure for e-Social Science.pdf - Accepted Version Download (99kB) | Preview |
Abstract
An e-Social Science infrastructure generally has security requirements to protect their restricted resources or services. As a widely accepted authentication and authorization technology, Shibboleth supports the sharing of resources on interinstitutional federation. Guanxi is an open source implementation of the Shibboleth protocol and architecture. In this paper, we propose a security infrastructure for e-social science based on the Guanxi Shibboleth. This security infrastructure presents two main features. Firstly, Guanxi Shibboleth is integrated into the user-friendly Sakai collaborative and learning environment which provides an ideal place for users to access a variety of federation resources in line with the Shibboleth authentication model. Secondly, PERMIS technology is used to enhance the authorization mechanisms thus enabling a policy-driven, role-based, fine-grained access control. As a result, the security infrastructure presents the advantages of Guanxi Shibboleth, PERMIS and Sakai, and it has been applied to e-Social Science application. We believe this security infrastructure provides a promising authentication and authorization solution for e-social science applications as well as applications in other domains.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISBN: | 9780769537207 |
Identifier: | 10.1109/EDOCW.2008.6 |
Identifier: | 10.1109/EDOCW.2008.6 |
Additional Information: | © 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Keywords: | Security, Authorization, Authentication, Access control, Protection, Access protocols, Collaboration, Public key, Scalability, Permission |
Subjects: | Computing |
Depositing User: | Vani Aul |
Date Deposited: | 18 Dec 2013 11:20 |
Last Modified: | 28 Aug 2021 07:16 |
URI: | https://repository.uwl.ac.uk/id/eprint/561 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |