ETSI GS INS 005-2011 Identity and access management for Networks and Services Requirements of an Enforcement Framework in a Distributed Environment《网络和业务的身份和接入管理 分布式系统中的增强框架要求(版本1 _1.pdf
《ETSI GS INS 005-2011 Identity and access management for Networks and Services Requirements of an Enforcement Framework in a Distributed Environment《网络和业务的身份和接入管理 分布式系统中的增强框架要求(版本1 _1.pdf》由会员分享,可在线阅读,更多相关《ETSI GS INS 005-2011 Identity and access management for Networks and Services Requirements of an Enforcement Framework in a Distributed Environment《网络和业务的身份和接入管理 分布式系统中的增强框架要求(版本1 _1.pdf(19页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI GS INS 005 V1.1.1 (2011-03)Group Specification Identity and access management for Networks and Services;Requirements of an Enforcement Frameworkin a Distributed EnvironmentDisclaimer This document has been produced and approved by the Identity and Access Management for Networks and Services (E
2、TSI INS) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. ETSI ETSI GS INS 005 V1.1.1 (2011-03)2Reference DGS/INS-005 Keywords authorization, enforcement ETSI 650
3、 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downlo
4、aded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference
5、shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is av
6、ailable at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. Th
7、e copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2011. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM
8、 is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the
9、GSM Association. ETSI ETSI GS INS 005 V1.1.1 (2011-03)3Contents Intellectual Property Rights 4g3Foreword . 4g3Introduction 4g31 Scope 5g32 References 5g32.1 Normative references . 5g32.2 Informative references 5g33 Definitions and abbreviations . 6g33.1 Definitions 6g33.2 Abbreviations . 6g34 Curren
10、t Landscape 7g34.1 eXtensible Access Control Markup Language (XACML) . 7g34.2 Enterprise Privacy Authorization Language (EPAL) . 7g34.3 Sticky Policies 7g34.4 Microsoft Security Policy Assertion Language 8g35 Application Scenarios. 8g35.1 support for the specification and enforcement of privacy obli
11、gation in clouds . 8g35.2 Location Based Service in Enterprise Environment . 9g35.2.1 Description 9g35.2.2 Actors 10g35.2.2.1 Actors specific Issues 10g35.2.2.2 Actors specific Benefits 10g35.2.3 Pre-Conditions 11g35.2.4 Post-Conditions. 11g35.3 Online Social Network Site 11g35.3.1 Description 11g35
12、.3.2 Actors 11g35.3.3 Actors specific Issues 11g35.3.4 Actors specific Benefits 12g35.3.5 Pre-Conditions 12g35.3.6 Post-Conditions. 12g35.4 Specification of enforcement location 13g35.5 Dynamic obligation specification . 13g36 Requirements 14g36.1 General Distributed Enforcement Framework Requiremen
13、ts 14g36.2 Enforcement Point requirements 16g36.3 Management Requirements 16g36.4 Obligation Requirements 16g36.5 Distributed Decision Point requirements 17g37 Conclusion 17g3Annex A (informative): Authors Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, whic
14、h is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
15、 referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Group Specification (GS) has been produced by ETSI Industry Specification (ISG) Identity and access management for Networks and Services (INS).
16、 Introduction Enforcing authorization decisions in a distributed environment is a challenging task compared to traditional services. The entity directly controlling and enforcing, the access to the resources may be organizational or physically separated from the entity providing the decision. In a c
17、loud environment multiple entities might control the authorization for a particular activity. In addition to the enforcement of the pure access decision a set of obligations may have to be enforced. Another approach is to attach the access policy directly to the data and ensure that it is always enf
18、orced. In a distributed environment these approaches require not only a trust relationship between the enforcement and decisions points on the one hand and entities passing data with attached policies on the other hand, it also has to be ensured that decisions and obligations has well as the attache
19、d policies are syntactically and semantically understood in the same way at all involved entities. While the use cases and resulting requirements of distributed access control has been previously addressed i.1 is focusing more on the decision process, the present document considers the distributed e
20、nforcement of these decisions and the related obligations, which are used to protect the data in general, ensure the privacy of the user, or provides flexible auditing of the access requests. If multiple entities are involved in the decision process their obligations have to be enforced as well. The
21、 present document will also illustrate that for a distributed environment to location of the enforcement is an important aspect. As different entities are involved the obligations utilized in the authorization process have to be specified in a dynamic manner. After providing the relevant references
22、and defining the used terminology an overview of the current landscape on distributed enforcement environment is given. The main contribution of the present document is a set of application scenarios illustrating various aspects of distributed enforcement environments which are not yet considered or
23、 addressed by other standardization activities. These application scenarios are also used to illustrated requirements related to distributed enforcement environments, which are finally presented in the present document. ETSI ETSI GS INS 005 V1.1.1 (2011-03)51 Scope The present document will provide
24、the requirements on distributed enforcement environments, taking into account attached policies as well as frameworks with dedicated enforcement and decision points. The requirements of the decision making process has been covered in i.1. The present document will not only deal with the requirements
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGSINS0052011IDENTITYANDACCESSMANAGEMENTFORNETWORKSANDSERVICESREQUIREMENTSOFANENFORCEMENTFRAMEWORKINADISTRIBUTEDENVIRONMENT

链接地址:http://www.mydoc123.com/p-733261.html