revoke the trust with the sites. It also allows
applying the security policy defined in the PAP
module.
PAP: Is the module where the access control
policy is defined.
PIP: Allows the capture of the user’s context
(device used, connection type etc.). It also maintains
a table of trusted sites updated by the trust controller
module of PDP.
5 CONCLUSIONS
Through this study we came to the conclusions that
the concept of the propagation of trust in a dynamic
way is not fully exploited to interconnect the
security policies in various fields. Reply to this lack
could bring us closer to our goal of protecting the
identity of the users, and this in "globalizing" the
SSO system across domains: a single sign-on (SSO)
would not only provide access to several domain
resources belonging to the user, but also the
resources of the areas of trust where the user goes,
without being forced to decline again its identity.
This would avoid to re-circulate the information of
identification / authentication at the risk that it
would be intercepted by a third party.
Therefore, we proposed a generic architecture,
setting up a collaborative security mechanism based
on reputation and trust level accumulated by each
domain towards its peers. This work is a first step on
designing our architecture, and the future works will
be focused on calculating the value of the trust level
by providing a function that calculates this value.
REFERENCES
Girma, B., 2006. Thesis: Accès et adaptation de contenus
multimédia pour les systèmes pervasifs. INSA Lyon.
Rigney, C., Rubens, A., Simpson, W., Willens, S., 1997.
RFC 2138: Remote Authentication Dial In User
Service (RADIUS).
Wiki.LemonLDAP,2007
http://wiki.lemonldap.objectweb.org.
Recordon, D., Reed D., 2006. OpenID 2.0: a platform for
user-centric identity management. In The 2
nd
ACM
workshop on digital identity management, pp.11-16,
ACM Press, Virginia, USA.
Alsaleh, M., Adams, C., 2006. Enhancing Consumer
Privacy in the Liberty Alliance identity Federation and
Web Services Frameworks Workshop on Privacy
Enhancing Technologies, pp. 59-77, Cambridge, UK.
Shibboleth Development Team, 2009. Shibboleth Project,
http://shibboleth.internet2.edu/.
OASIS, 2004. Web Services Security Specification.
http://www.oasis-open.org/.
Thompson, M., Johnston, W., Mudumbai, S., Hoo, G.,
Jackson, K., Essiari, A., 1999. Certificate-based access
control for widely distributed resources. In SSYM 08’:
8
th
Conference on USENIX Security Symposium, p.17,
USENIX Association Berkeley, USA.
Chadwick, D., Otenko, A., 2003. The PERMIS X.509 role
based privilege management infrastructure. Future
Generation Computer Systems Journal, Vol 19, No 2,
pp.277-289.
Pearlman, L., welch, V., Foster, I., Kasselman, C., Tuecke,
S., 2002. A Community Authorization Service for
Group Collaboration. In POLICY 02’: 3
rd
International workshop on policies for Distributed
Sustems and Networks, pp.50-59, IEEE Computer
Society, Washington, USA.
Alferi, R., Cecchini, R., Ciaschini, V., Dell’Agnello, L.,
Frohner, A., Gianoli, A., Lörentey, K., Spataro., F.,
2004. VOMS, an Authorization Systemm fort Virtual
Organizations. In European Across Grids Conference,
pp.33-40, Verlag, Spain.
Cuppens, F., Nora cuppens-Boulahia C., 2006. O2O:
Managing Security policy Interoperability with Virtual
Private Organizations. In ICISS 06’. 2
nd
International
Conference on Information Systems Security, pp. 101-
115, Kolkata, India.
Seitz, L., Pierson, J., Brunie, L., 2005. Sygn : A certificate
based access control in Grid environnements. Tech
Rep. INSA Lyon, France.
Roman, M., Hess, C., Cerqueira, R., Ranganathan, A.,
Campbel, R., Nahrstedt, K., 2002. Gaia: A
Middleware Infrastructure for Active Spaces. In IEEE
Pervasive Computing Vol.1, No 4, pp. 74-83.
Giang, P., Hung, L., Lee, S., Lee, Y., Lee, H., 2007. A
flexible Trust-based Access Control mechanism For
Security and Privacy Enhancement in Ubiquitous
Systems. In MUE 07’, International Conference on
Multimedia and Ubiquitous Engineering, pp.698-703,
IEEE Computer Society, Washington, USA.
A COLLABORATIVE SECURITY MECHANISM BASED ON REPUTATION AND TRUST LEVEL IN PERVASIVE
SYSTEMS
261