Flexible Scalable Application Authorization For Cloud Computing Environments
A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
10.09.2009
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol supported. Successfully presenting security credentials at a security principal allows use of an instance of the security principal (i.e. application) as well as generation of an authentication token that can be presented across the computing environment to resources subscribing to the same authorization policy. As security principals with different security policies are authenticated, the appropriate tokens may be combined to allow broader access without undue re-authentication for resources subscribing to the same security policy. Authorization requirements (policies) may be attached to links to resources so that an application instance can dynamically discover authentication rules for that resource by inspecting the link. |
---|---|
Bibliography: | Application Number: US20080241710 |