skip to main content
10.1145/1102486.1102502acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A delegation framework for federated identity management

Authors Info & Claims
Published:11 November 2005Publication History

ABSTRACT

Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accelerating automation of Web Services on the Internet for users on their behalf while protecting privacy of their personally identifiable information. Although users of Web Services essentially delegate some or all privileges to an entity to perform actions, current identity based systems do not take into sufficient consideration delegation between entities hosting Web Services from a viewpoint of identity and privacy. This paper introduces a delegation model for federated identity management systems and proposes a delegation framework to provide solutions for access control in the context of delegation. The framework has a function of transferring user's privileges across the entities encoded in delegation assertion extending SAML (Security Assertion Markup Language). The framework enables users to manage their own privileges, and service providers to control access of entities based on delegated privileges by the users with assistance of a delegation authority that authorizes delegation of a delegating entity and an authentication authority that authenticates a user and manages user's name identifiers.

References

  1. M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. "A Calculus for Access Control in Distributed Systems"". ACM Transactions on Programming Languages and Systems 15(4):706--734,1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Ahsant, J. Basney, and O. Mulmo." "Grid Delegation Protocol".In Proceedings of the Workshop on Grid Security Practice and Experience July 2004.Google ScholarGoogle Scholar
  3. O. Bandmann, M. Dam, and B. Firozabadi. "Constrained Delegation".In Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P '02) pages 131--140,2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. BEA, IBM, Microsoft, RSA Security, and VeriSign. "Web Services Federation Language (WS-Federation)". Version 1.0, July 2003.Google ScholarGoogle Scholar
  5. O. Canovas and A. Gomez. "Delegation in Distributed Systems: Challenges and Open Issues". In Proceedings of IEEE Internatinal Workshop on Database and Expert Systems Applications (DEXA '03)September 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Chadwick and A. Otenko. "The PERMIS X.509 Role Based Privilege Management Infrastructure". In Proceedings of the seventh ACM Symposium on Access Control Models and Technologies (SACMAT '02) pages 135--140,2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. X. Feng, L. Guoyuan, H. Hao, and X. Li. "Role-Based Access Control System for Web Services". In Proceedings of the fourth International Conference on Computer and Information Technology (CIT '04) pages 357--362,2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. IBM, Microsoft, Actional, BEA, Computer Associates, Layer 7, Oblix, OpenNetwork, Ping Identity, Reactivity, and Verisign. "Web Services Trust Language (WS-Trust)", February 2005.Google ScholarGoogle Scholar
  9. S. Na and S. Cheon. "Role Delegation in Role-Based Access Control". In Proceedings of the fifth ACM Workshop on Role-Based Access Control pages 39--44, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. Navarro, B. Fironzabadi, E. Rissanen, and J. Borrell. "Constrained Delegation in XML-based Access Control and Digital Rights Management Standards". In Proceedings of Communication, Network, and Information Security (CNIS '03)2003.Google ScholarGoogle Scholar
  11. OASIS. "Web Services Security: SOAP Message Security 1.0". OASIS Standard, March 2004.Google ScholarGoogle Scholar
  12. OASIS. "Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML)V2.0". OASIS Standard, March 2005.Google ScholarGoogle Scholar
  13. OECD. "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data", 2004.http://www.oecd.org/document/18/0,2340, en_2649 201185_1815186_1_1_1_1,00.htmlGoogle ScholarGoogle Scholar
  14. OPA. "Guidelines for Online Privacy Policies". http://www.privacyalliance.org/resources/ppguidelines.shtmlGoogle ScholarGoogle Scholar
  15. Liberty Alliance Project. "Liberty ID-FF Protocols and Schema Specification".Version 1.2, November 2003.http://www.projectliberty.org/specsGoogle ScholarGoogle Scholar
  16. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. "Role-Based Access Control Models". IEEE Computer 29(2):38--47,February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Shin, G. Ahn, and P. Shenoy. "Ensuring Information Assurance in Federated Identity Management". In Proceedings of IEEE Internatinal Performance Computing and Communications Conference (IPCCC '04)April 2004.Google ScholarGoogle Scholar
  18. The Globus Security Team. "Globus Toolkit Version 4 Grid Security Infrastructure:A Standards Perspective". Version 2, December 2004.Google ScholarGoogle Scholar
  19. W3C. "Web Services Description Language (WSDL) 1.1". W3C Note, March 2001. http://www.w3.org/TR/wsdlGoogle ScholarGoogle Scholar
  20. W3C. "The Platform for Privacy Preferences 1.0 (P3P1.0)Specification". W3C Recommendation, April 2002.http://www.w3.org/TR/P3P/Google ScholarGoogle Scholar
  21. W3C. "SOAP Version 1.2 Part 0:Primer". W3C Recommendation, June 2003. http://www.w3.org/TR/soap12-part0/Google ScholarGoogle Scholar
  22. J. Wang, D. Vecchio, and M. Humphrey. "Extending the Security Assertion Markup Language to Support Delegation for Web Services and Grid Services". IEEE International Conference on Web Services (ICWS'05)July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. V. Welch, I. Faster, C. Kesselman, O. Mulmo, L. Pearlman, S. Tuecke, J. Gawor, S. Meder, and F. Siebenlist. "X.509 Proxy Certificates for Dynamic Delegation". 3rd Annual PKI R&D Workshop 2004.Google ScholarGoogle Scholar
  24. L. Zhang, G. Ahn, and B. Chu. "A Rule-Based Framework for Role-Based Delegation". In Proceedings of the sixth ACM Symposium on Access Control Models and Technologies pages 153--162, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A delegation framework for federated identity management

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DIM '05: Proceedings of the 2005 workshop on Digital identity management
        November 2005
        120 pages
        ISBN:1595932321
        DOI:10.1145/1102486

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 November 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate16of34submissions,47%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader