Affiliation : Institute for Defense Analyses, 4850 Mark Center Dr., Alexandria
Country : Virginia
Category : Computer Science & Information Technology
Volume, Issue, Month, Year : 7, 8, June, 2017
Abstract
Increasing
threat intrusions to enterprise computing systems have led to a formulation of
guarded enterprise systems. The approach was to put in place steel gates and
prevent hostile entities from entering the enterprise domain. The current
complexity level has made the fortress approach to security implemented
throughout the defence, banking, and other high trust industries unworkable.
The alternative security approach presented in this paper is the result of a
concentrated fourteen year program of pilots and research. Its distributed
approach has no need for passwords or accounts and derives from a set of tenets
that form the basic security model requirements. At each step in the process it
determines identities and claims for access and privileges. These techniques
are resilient, secure, extensible, and scalable. They are currently being
implemented for a major enterprise, and are a candidate for other enterprise
security approaches. This paper discusses the Enterprise Level Security
architecture, a webbased security architecture designed to select and
incorporate technology into a cohesive set of policies and rules for an
enterprise information system. The paper discusses the history, theoretical
underpinnings, implementation decisions, current status, and future plans for
expansion of capabilities and scale.
Keyword : Access control, attributes, authentication, claims, cryptography, digital signatures, enterprise, high assurance, identity management systems, public key infrastructure
For More Details : http://airccj.org/CSCP/vol7/csit77009.pdf
No comments:
Post a Comment