authorization and access control capabilities provided by extranets is a mayor draw-
back for their application in open and heterogeneous scenarios.
Trust appears as the main issue to address in the design of a platform allowing se-
cure interoperation of different independent entities. Many distributed application
scenarios such as e-commerce, e-business, e-government, grid computing or web
services can benefit from the services of such platform. Some important characteris-
tics of these scenarios are:
Independence of Authorities. The authorities, as well as the rules governing the
functioning of each party are usually predefined and must be independent of others
and under control of the legitimate authority.
Attribute-based access. Usually, access is offered to previously unknown users
(individual citizens and members of other entities). Knowledge of their identities,
provided by a Public Key Infrastructure (PKI) is not sufficient in order to interact
with them.
Heterogeneity. In open distributed systems we deal with a large number of stake-
holders or owners of resources with very different policies and interests, but also
with a large number of previously unknown clients, with very different profiles
and interests. Moreover, resources under control are intrinsically heterogeneous in
type, format, origin, validity, etc. Consequently, the security requirements and ac-
cess control criteria are also very disparate. As a result, it is impossible for admin-
istrators to foresee a fixed role-based structure of the users.
Flexibility. A high degree of flexibility is required because of the heterogeneous
nature of the resources (data and services), access criteria and users. In fact, flexi-
bility appears as one of the most important goals to achieve. The model must be
flexible enough to be applicable in different scenarios with few or no changes.
Scalability. The scalability of the scheme is very important. Therefore, a fully
distributed scheme is mandatory. Furthermore, due to the large amount of re-
sources, it is important to be able to determine access conditions automatically,
based on their associated semantic information.
Interoperability. In these scenarios, it is not possible to predict the interactions with
other parties. Typically, these interactions will take place only occasionally and
parties will frequently be related by a few transactions in common. Because we are
dealing with security-sensitive systems, it is essential to guarantee that the interop-
eration with other parties does not introduce any security weakness.
Dynamism. This characteristic is essential in most of our targeted scenarios, where
the existence of highly dynamic resources is frequent. The access control model
must be capable of adapting to frequent changes in access control criteria, client at-
tributes, environment conditions, resources available, etc. To avoid management
overload due to the control of changes, the model must adapt in a transparent and
automatic way to these changes.
The previous list of characteristics poses important challenges on the underlying
security mechanisms and especially in authorization and access control systems. Para-
doxically, it is frequent for access control and authorization mechanisms in distrib-
uted systems to rely on centralized security administration. In fact, existing solutions
for distributed authorization and access control do not provide the flexibility and
manageability required. Summarizing, it is clear that new solutions are required to
270