Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
The development of eXtensible Distributed Access Control (XDAC) systems is influenced by the transference of data access and storage from the local computer to the network. In this distributed system, access control is determined by independent components which transmit requests and decisions over a network, utilizing XML signing capabilities found in the Security Assertion Markup Language (SAML). All resources in the XDAC system are protected by the first component, a Policy Enforcement Point (PEP), which acts as the main divider between the requesting entity and the requested resource. The PEP grants access to a resource only if the second component, a Policy Decision Point (PDP), returns a permit response after consulting a set of applicable policies based on the requester's attributes, the resource, the action that the requester desires to apply to that resource, and optionally the environment. With Sun's eXtensible Access Control Markup Language (XACML), the XML encoded policies can be combined among multiple nodes across a network using XACML rules and algorithms to formulate a single decision based on an XACML request. In this thesis project, I build a secure and efficient XDAC System based on XACML, implement an extension to the SAML Assertion design by including XACML Attributes and Results, describe in-detail about the many features that a XDAC System should embody, and show how a XDAC System would be effectively used in modern day computing.
Senior Honors Thesis. Advisor: Ed Feustel.
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
Paul J. Mazzuca, "Access Control in a Distributed Decentralized Network: An XML Approach to Network Security using XACML and SAML." Dartmouth Computer Science Technical Report TR2004-506, Spring 2004.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.