Flexible Scalable Application Authorization For Cloud Computing Environments

A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol...

Full description

Saved in:
Bibliographic Details
Main Authors BATOUKOV ROMAN, GBADEGESIN ABOLADE, REED DAVID R
Format Patent
LanguageEnglish
Published 10.09.2009
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol supported. Successfully presenting security credentials at a security principal allows use of an instance of the security principal (i.e. application) as well as generation of an authentication token that can be presented across the computing environment to resources subscribing to the same authorization policy. As security principals with different security policies are authenticated, the appropriate tokens may be combined to allow broader access without undue re-authentication for resources subscribing to the same security policy. Authorization requirements (policies) may be attached to links to resources so that an application instance can dynamically discover authentication rules for that resource by inspecting the link.
Bibliography:Application Number: US20080241710