An XRI Naming System for Dynamic and Federated Clouds: a Performance Analysis
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Trusted Computing Or Distributed Trust Management?
Trusted computing or distributed trust management? Michele Tomaiuolo Dipartimento di Ingegneria dell’Informazione Università di Parma Via Usberti, 181/A – 43100 Parma – Italy [email protected] Abstract Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures. In this field, trust management systems can play an important role, being based on a totally distributed architecture. The idea of distributed trust management can be confronted with the concept of trusted computing. Though having a confusingly similar denomination, the different interpretation of trust in these systems drives to divergent consequences with respect to system architectures and access policies, but also to law, ethics, politics. While trusted computing systems assure copyright holders and media producers that the hosting system will respect the access restrictions they defined, trust management systems, instead, allow users to grant trust to other users or software agents for accessing local resources. Keywords Data security, Security Management, Authentication, Authorization, Intellectual Property Rights, Information Access, Digital Books, Multimedia, Web Technologies Introduction A number of architectures and systems are being proposed as a ground for improved interoperability among diverse systems, mainly exploiting the idea of service-oriented architecture. Yet, some issues remain open. In fact, composition of services requires some delegation of goals and duties among partners. But these delegations cannot come into effect, if they’re not associated with a corresponding delegation of privileges, needed to access some resources and complete delegated tasks, or achieve desired goals. -
Global Namespace Discovery Using a XRI Root-Of-Roots Assumed by ITU-T
Geneva, 21 September 2007 Global Namespace Discovery using a XRI root-of-roots assumed by ITU-T Tony Rutkowski Chair, ITU-T IdM FG Requirements WG [email protected] XRI detail slides courtesy of Reed Drummond OASIS Extensible Resource Identifier (XRI) TC International http://xri.net/=drummond.reed Telecommunication Union Identity Discovery Requirements 5.3 Discovery of authoritative Identify Provider resources, services, and federations. A critical IdM challenge in the very dynamic and diverse world of network services and applications is discovering current authoritative sources for the four core IdM categories described above or the federations that are associated with enabling discovery and access of the relevant IdM resources. It is not enough for the IdM capabilities to exist, if a relying party has no means for knowing who and how to reach and interoperate with the authoritative resources for asserted identities treated in the sub-section below. Identity Discovery Provider(s) Query(ies) to discover Identity Resources Response(s) Fig. 9. Identity Management Discovery Services A very significant number of contributions and use-cases during the entire activity period of the Focus Group dealt with Discovery capabilities and associated requirements. Discovery capabilities seem to be widely recognized as one of the most significant needs and gaps – including a consensus that the challenge of providing effective Discovery capabilities are therefore an essential part of trusted Identity Management. Some federations and communities surrounding Open Identity protocols have developed partial solutions to meet discovery needs within the boundaries of their user communities. However, there are no current means for global or inter-federation discovery. -
Gs Ins 006 V1.1.1 (2011-11)
ETSI GS INS 006 V1.1.1 (2011-11) Group Specification Identity and access management for Networks and Services; Study to Identify the need for a Global, Distributed Discovery Mechanism Disclaimer This document has been produced and approved by the Identity and access management for Networks and Services (INS) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. 2 ETSI GS INS 006 V1.1.1 (2011-11) Reference DGS/INS-006 Keywords access, control, ID, management, network, service ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. -
Extensible Resource Identifier (XRI) Resolution Version 2.0 Committee Draft 02 25 November 2007
Extensible Resource Identifier (XRI) Resolution Version 2.0 Committee Draft 02 25 November 2007 Specification URIs: This Version: http://docs.oasis-open.org/xri/2.0/specs/cd02/xri-resolution-V2.0-cd-02.html http://docs.oasis-open.org/xri/2.0/specs/cd02/xri-resolution-V2.0-cd-02.pdf http://docs.oasis-open.org/xri/2.0/specs/cd02/xri-resolution-V2.0-cd-02.doc Previous Version: N/A Latest Version: http://docs.oasis-open.org/xri/2.0/specs/xri-resolution-V2.0.html http://docs.oasis-open.org/xri/2.0/specs/xri-resolution-V2.0.pdf http://docs.oasis-open.org/xri/2.0/specs/xri-resolution-V2.0.doc Technical Committee: OASIS eXtensible Resource Identifier (XRI) TC Chairs: Gabe Wachob, AmSoft <[email protected]> Drummond Reed, Cordance <[email protected]> Editors: Gabe Wachob, AmSoft <[email protected]> Drummond Reed, Cordance <[email protected]> Les Chasen, NeuStar <[email protected]> William Tan, NeuStar <[email protected]> Steve Churchill, XDI.org <[email protected]> Related Work: This specification replaces or supercedes: • Extensible Resource Identifier (XRI) Resolution Version 2.0, Committee Draft 01, March 2005 • Extensible Resource Identifier (XRI) Version 1.0, Committee Draft 01, January 2004 This specification is related to: • Extensible Resource Identifier (XRI) Syntax Version 2.0, Committee Specification, December 2005 • Extensible Resource Identifier (XRI) Metadata Version 2.0, Committee Draft 01, March 2005 Declared XML Namespace(s) xri://$res xri://$xrds xri://$xrd XRI Resolution 2.0 Committee Draft 02 25 November 2007 Copyright © OASIS® 1993–2007. -
OSCRE Industry Alliance Organizations Synopsis
OSCRE Connecting the Real Estate Industry ALLIANCE ORGANIZATION SYNOPSIS OSCRE is the trading name of OSCRE Americas Inc., part of the OSCRE International global network supporting the Americas. OSCRE Americas Inc. is registered in Washington, District of Columbia. E-mail: [email protected] Web: www.oscre.org © 2003, 2004 OSCRE International. All Rights Reserved. Version History 1.0 Andy Fuhrman March 29, 2004 Document Creation 1.1 Andy Fuhrman April 4, 2004 Incorporated feedback from OSCRE International Executive Board 1.2 Chris Lees May 26, 2004 Section 2: Verbiage Modification OSCRE International OSCRE Americas PISCES Limited 2020 Pennsylvania Avenue, NW 7-8 Greenland Place Box #1024 LONDON, NW1 0AP Washington, DC 20006 www.pisces.co.uk www.oscre.org ALLIANCE ORGANIZATION SYNOPSIS © 2003-2004 OSCRE International. All Rights Reserved. 2 of 46 Contents 1 Mission ................................................................................................... 4 2 Industry Focus ......................................................................................... 4 3 Methodology ............................................................................................ 4 4 Document Purpose ................................................................................... 5 5 About OSCRE........................................................................................... 5 5.1 OSCRE International Executive Board Members ..................................... 6 5.2 Projected OSCRE Timeline ................................................................. -
The XDI RDF Model V11, 2008-10-21
The XDI RDF Model V11, 2008-10-21 This document is a work-in-progress from the OASIS XDI Technical Committee. Contributors to this draft include: • Drummond Reed, Cordance • Markus Sabadello, XDI.org • Paul Trevithick, Higgins Project A link to the current version of this document is maintained on the following XDI TC wiki page: http://wiki.oasis-open.org/xdi/XdiRdfModel The XDI RDF Model v11 2008-10-21 Page 2 Table of Contents Introduction .................................................................................................................................................... 3 Motivations..................................................................................................................................................... 3 About the Proposed XRI 3.0 Syntax Used in this Document.........................................................................4 Cross-References ....................................................................................................................................... 4 Global Context Symbols............................................................................................................................ 4 Global Cross-References ........................................................................................................................... 5 The XDI RDF Model...................................................................................................................................... 5 Basic Structure and Addressing................................................................................................................ -
Extensible Resource Identifier (XRI) Resolution V2.0
1 2 Extensible Resource Identifier (XRI) 3 Resolution V2.0 4 Working Draft 10, 18 March 2006 5 Document identifier: 6 xri-resolution-V2.0-wd-10 7 Location: 8 http://docs.oasis-open.org/xri/xri/V2.0 9 Editors: 10 Gabe Wachob, Visa International <[email protected]> 11 Drummond Reed, Cordance <[email protected]> 12 Les Chasen, NeuStar <[email protected]> 13 William Tan, NeuStar <[email protected]> 14 Steve Churchill, XDI.ORG <[email protected]> 15 Contributors: 16 Dave McAlpin, Epok <[email protected]> 17 Chetan Sabnis, Epok <[email protected]> 18 Peter Davis, Neustar <[email protected]> 19 Victor Grey, PlaNetwork <[email protected]> 20 Mike Lindelsee, Visa International <[email protected]> 21 Abstract: 22 This document defines both generic and trusted HTTP(S)-based resolution protocols for 23 Extensible Resource Identifiers (XRIs) as defined by Extensible Resource Identifier (XRI) 24 Syntax V2.0 [XRISyntax] or higher. For the set of XRIs defined to provide identifier 25 metadata, see Extensible Resource Identifier (XRI) Metadata V2.0 [XRIMetadata]. For a 26 basic introduction to XRIs, see the XRI 2.0 FAQ [XRIFAQ]. 27 Status: 28 This document was last revised or approved by the XRI Technical Committee on the 29 above date. The level of approval is also listed above. Check the current location noted 30 above for possible later revisions of this document. This document is updated periodically 31 on no particular schedule. 32 Technical Committee members should send comments on this specification to the 33 Technical Committee's email list. -
Member of Security Technical Committees Spanning Federated Identity, Key Management, Health Care Privacy
Security Standardization . Oasis Standards Consortium Geneva, 6-7 December Addressing security challenges on a global scale 2010 2 Speaker Anil Saldhana Co-Chair, Oasis Identity In The Cloud TC Member, Oasis IDTrust Steering Committee . Member of Security Technical Committees spanning Federated Identity, Key Management, Health Care Privacy . [email protected] Geneva, 6-7 December Addressing security challenges on a global scale 2010 3 About Oasis “Organization for the Advancement of Structured Information Standards” – Founded in 1993 as SGML Open – Not for profit consortium – Global Representation • 5000+ Participants. • 600+ Organizations/Individual Members. • 100+ Countries. Geneva, 6-7 December Addressing security challenges on a global scale 2010 4 Oasis Member Sections Member Sections include – IDTrust – Egov – Blue (SmartGrids/Intelligent Buildings) – WS-I etc. Geneva, 6-7 December Addressing security challenges on a global scale 2010 5 Oasis IDTrust Member Section Promotes greater understanding and adoption of standards for Identity and Trusted Infrastructure . Technologies, Policies and Practices Geneva, 6-7 December Addressing security challenges on a global scale 2010 6 Oasis IDTrust Member Section Technical Committees Identity Metasystems/Internet Identity . Identity In The Cloud (IDCloud) . Identity Metasystem Interoperability (IMI) . Extensible Resource Identifier(XRI) . XRI Data Interchange (XDI) Geneva, 6-7 December Addressing security challenges on a global scale 2010 7 Oasis IDTrust Member Section Technical Committees Encryption/Key Management . Key Mgmt. Interoperability Protocol (KMIP) . Enterprise Key Mgmt. Infrastructure (EKMI) Geneva, 6-7 December Addressing security challenges on a global scale 2010 8 Oasis IDTrust Member Section Technical Committees Trust/Privacy . Open Reputation Mgmt. Systems (ORMS) . Privacy Mgmt. Reference Model (PMRM) . Digital Signature Services Extended (DSS-X) . -
Yadis Specification 1.0
Yadis Specification 1.0 Yadis Specification Version 1.0 18 March 2006 Joaquin Miller, editor www.yadis.org 1 Yadis Specification 1.0 Table of Contents 0 Introduction........................................................................................................................................................ 3 1 Scope..................................................................................................................................................................... 3 2 Normative References.........................................................................................................................................4 2.1 Requests for Comments............................................................................................................................. 4 2.2 W3C Recommendations.............................................................................................................................4 2.3 OASIS Specifications...................................................................................................................................4 3 Terms and Definitions....................................................................................................................................... 5 3.1 Implementor Terms.................................................................................................................................... 5 3.2 Definitions from other specifications...................................................................................................... -
A Survey on Identity and Access Management in Cloud Computing
International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 4, April - 2014 A Survey on Identity and Access Management in Cloud Computing Nida1, Pinki2, Harsh Dhiman3, Shahnawaz Hussain 4 1, 2, 3,4 M.tech (CSE), School of Computing Science and Engineering, Galgotias University, Greater Noida, India Abstract- Cloud computing is one of the most emerging computing vendors on agreed basis for specific duration and technology in today’s scenario which aims to provide on- price[2]. Cloud computing has several deployment models, demand scalable access to computing resources over the namely, Private cloud: in which the cloud infrastructure is internet via cloud vendors to multi-tenant organizations. Cloud operated solely for a specific organization, and is managed computing provides a way through which an organization can by that organization only, Public Cloud: Here the resources increase their computing capabilities and infrastructure facilities dynamically as and when required. While cost and are shared by all users in a common space and it is owned On-demand availability are the top two benefits of cloud, but by cloud provider, Hybrid cloud: It combines the features of various trust and security issues are becoming the top concerns both private as well as public cloud and allow an for the cloud computing users. In federated identity organization to run some application on private whereas management environment, federated identity as a useful some on public clouds [3, 4]. There are basically five feature for Single Sign-on (SSO) and user management has security issues in Cloud Computing Security Risks in Cloud become an important part. -
An Introduction to XDI a White Paper for the OASIS XDI Technical Committee V2, April 12, 2004
The Dataweb: An Introduction to XDI A White Paper for the OASIS XDI Technical Committee v2, April 12, 2004 Drummond Reed, Cordance Geoffrey Strongin, AMD Abstract XDI (XRI Data Interchange) is a new service for generalized distributed data sharing and mediation using XRIs (Extensible Resource Identifiers), a URI-compatible abstract identifier scheme developed by the OASIS XRI Technical Committee. The goal of XDI is to enable data from any data source to be identified, exchanged, linked, and synchronized into a machine-readable dataweb using XML documents just as content from any content source can linked into the human-readable Web using HTML documents today. Because the controls needed to mediate access and usage of shared data can be built right into every XDI link, the emergence of a global Dataweb has the potential to do for trusted data interchange what the Web did for open content exchange. This white paper presents several examples of classic cross-domain data sharing problems, explains how the Dataweb model can provide a generalized solution, and describes the key objectives of the newly formed OASIS XDI Technical Committee (http://www.oasis-open.org/committees/xdi). HTML HTML XML/ XML/ XDI XDI XDI link contract HTML HTML HTML HTML XML/ XML/ XML/ XML/ XDI XDI XDI XDI HTML HTML HTML HTML XML/ XML/ XML/ XML/ XDI XDI XDI XDI Website A Website B Dataweb Site A Dataweb Site B The Dataweb: An Introduction to XDI April 12, 2004 Page 2 Table of Contents INTRODUCTION.......................................................................................................................................3 -
Identity Management Challenges for Intercloud Applications
D. Nu~nez,I. Agudo, P. Drogkaris, and S. Gritzalis, \Identity Management Challenges for Intercloud Applications", 1st International Workshop on Security and Trust for Applications in Virtualised Environments (STAVE 2011) vol. 187, pp. 198-204, 2011. http://doi.org/10.1007/978-3-642-22365-5_24 NICS Lab. Publications: https://www.nics.uma.es/publications Identity Management Challenges for Intercloud Applications David Núñez1, Isaac Agudo1, Prokopios Drogkaris2 and Stefanos Gritzalis2 1 Department of Computer Science, E.T.S. de Ingeniería Informática, University of Málaga, E-29071 Málaga, Spain {dnunez, isaac}@lcc.uma.es 2 Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean Samos, GR-83200, Greece {pdrogk, sgritz}@aegean.gr Abstract. Intercloud notion is gaining a lot of attention lately from both enterprise and academia, not only because of its benefits and expected results but also due to the challenges that it introduces regarding interoperability and standardisation. Identity management services are one of the main candidates to be outsourced into the Intercloud, since they are one of the most common services needed by companies and organisations. This paper addresses emerging identity management challenges that arise in intercloud formations, such as naming, identification, interoperability, identity life cycle management and single sign-on. Keywords: Cloud computing, identity management, intercloud, interoperability. 1 Introduction The adoption of the cloud computing design pattern is rapidly evolving as more and more organisations reach out for the benefits of distributed datacenters. One of the main advantages of cloud computing is that it provides a model of “utility computing”; that is, it is capable of offering on-demand provisioning of computing resources, such as storage, computation and networking.