skip to main content
10.1145/1314418.1314429acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A scalable and flexible web services authentication model

Published:02 November 2007Publication History

ABSTRACT

The WS-* specification set defines a message authentication model for web services. This model targets the authentication of messages exchanges in large scale decentralized systems, composed by different authentication domains. However, it has scalability and flexibility limitations: the acquirement of identity claims requires online interactions with security token services, which introduces communication overhead and creates performance bottlenecks; the services' policies, containing its requirements, must directly point to the issuing security token services, limiting the flexibility of the trust relations.

We present a new model, addressing these limitations, using two concepts from the trust management paradigm: credentials for claim inference and claim-based issuer references (attribute based delegation). We show how credentials are used both to increase the scalability, reducing the number of online token requests, and to increase the flexibility by allowing indirect trust relations, namely claim based delegation. We also show how the simultaneous usage of security tokens and credentials results in several advantages of our model, when compared to credential only trust management models.

The proposed model fits nicely into the WS-* framework, namely into its message security model and policy language. We illustrate this with the implementation of an extension to the Windows Communication Foundation - a commercial grade web services platform - that provides support for this model.

References

  1. M. Blaze, J. Feigenbaum, and A. D. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issued for Mobile and Distributed Objects, pages 185--210. Springer-Verlag, 1999. Google ScholarGoogle Scholar
  2. K. Cameron and M. Jones. Design Rationale behind the Identity Metasystem Architecture. Microsoft.Google ScholarGoogle Scholar
  3. D. E. Clarke, J.-E. Elien, C. M. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285--322, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: assigning roles to strangers. In SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 2--14, 14--17 May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Jones. A Guide to Supporting Information Cards within Web Applications and Browsers as of the Information Card Profile V1.0. Microsoft, December 2006.Google ScholarGoogle Scholar
  6. N. Li, J. Feigenbaum, and B. Grosof. A logic--based knowledge representation for authorization with delegation. In CSFW '99: Proceedings of the 12th IEEE workshop on Computer Security Foundations, pages 162--174, 28--30 June 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Li and J. Mitchell. RT: a role-based trust-management framework. In DARPA Information Survivability Conference and Exposition, 2003. Proceedings, volume 1, pages 201--212 vol.1, 22--24 April 2003.Google ScholarGoogle Scholar
  8. N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35--86, 2003. Google ScholarGoogle ScholarCross RefCross Ref
  9. Microsoft. Windows Communication Foundation. http://msdn2.microsoft.com/en-us/netframework/aa663324.aspx.Google ScholarGoogle Scholar
  10. OASIS. Web Services Security Kerberos Token Profile 1.1, February 2006.Google ScholarGoogle Scholar
  11. OASIS. Web Services Security SAML Token Profile 1.1, February 2006.Google ScholarGoogle Scholar
  12. OASIS. Web Services Security: SOAP Message Security 1.1, February 2006.Google ScholarGoogle Scholar
  13. OASIS. Web Services Security UsernameToken Profile 1.1, February 2006.Google ScholarGoogle Scholar
  14. OASIS. WS--Trust 1.3, March 2007.Google ScholarGoogle Scholar
  15. H. Wang, S. Jha, T. Reps, S. Schwoon, and S. Stubblebine. Reducing the dependence of SPKI/SDSI on PKI. In D. Gollmann, J. Meier, and A. Sabelfeld, editors, Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS), volume 4189 of Lecture Notes in Computer Science, pages 156--173, Hamburg, Germany, September 2006. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Word Wide Web Consortium. Web Services Addressing 1.0, August 2005.Google ScholarGoogle Scholar
  17. Word Wide Web Consortium. Web Services Policy 1.5, June 2005.Google ScholarGoogle Scholar

Index Terms

  1. A scalable and flexible web services authentication model

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SWS '07: Proceedings of the 2007 ACM workshop on Secure web services
          November 2007
          128 pages
          ISBN:9781595938923
          DOI:10.1145/1314418

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 November 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader