Affiliation : Institute for Defense Analyses, 4850 Mark Center Dr., Alexandria
Country : Virginia
Category : Computer Science & Information Technology
Volume, Issue, Month, Year : 7, 8, July, 2017
Increasing threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to put in place steel gates and prevent hostile entities from entering the enterprise domain. The current complexity level has made the fortress approach to security implemented throughout the defence, banking, and other high trust industries unworkable. The alternative security approach presented in this paper is the result of a concentrated fourteen year program of pilots and research. Its distributed approach has no need for passwords or accounts and derives from a set of tenets that form the basic security model requirements. At each step in the process it determines identities and claims for access and privileges. These techniques are resilient, secure, extensible, and scalable. They are currently being implemented for a major enterprise, and are a candidate for other enterprise security approaches. This paper discusses the Enterprise Level Security architecture, a webbased security architecture designed to select and incorporate technology into a cohesive set of policies and rules for an enterprise information system. The paper discusses the history, theoretical underpinnings, implementation decisions, current status, and future plans for expansion of capabilities and scale.
Keyword : Access control, attributes, authentication, claims, cryptography, digital signatures, enterprise, high assurance, identity management systems, public key infrastructure
For More Details : https://airccj.org/CSCP/vol7/csit77009.pdf
Post a Comment