Using SAML for Attribution, Delegation and Least Privilege

Delegation, Attribution and Least Privilege are an implicit part of information sharing. In operating systems like Windows there is no security enforcement for code running in kernel mode and therefore such code always runs with maximum privileges. The principle of least privilege therefore demands...

Full description

Bibliographic Details
Main Authors: Coimbatore S. Chandersekaran, William R. Simpson
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2011-02-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/NK193KX.pdf
id doaj-6d9c84a92c4d486c89012030074c5aab
record_format Article
spelling doaj-6d9c84a92c4d486c89012030074c5aab2020-11-24T22:40:03ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242011-02-019117Using SAML for Attribution, Delegation and Least PrivilegeCoimbatore S. Chandersekaran0William R. Simpson1 Institute for Defense Analyses Institute for Defense Analyses Delegation, Attribution and Least Privilege are an implicit part of information sharing. In operating systems like Windows there is no security enforcement for code running in kernel mode and therefore such code always runs with maximum privileges. The principle of least privilege therefore demands the use of a user mode solutions when given the choice between a kernel mode and user mode solution if the two solutions provide the same results. Discussions in this paper will be restricted to OSI model levels five and above. This paper describes the SAML delegation framework in the context of a large enclave-based architecture currently being implemented by the US Air Force. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.http://www.iiisci.org/Journal/CV$/sci/pdfs/NK193KX.pdf Information SharingEnterpriseInformation SecurityAttributiondelegationLeast Privilege
collection DOAJ
language English
format Article
sources DOAJ
author Coimbatore S. Chandersekaran
William R. Simpson
spellingShingle Coimbatore S. Chandersekaran
William R. Simpson
Using SAML for Attribution, Delegation and Least Privilege
Journal of Systemics, Cybernetics and Informatics
Information Sharing
Enterprise
Information Security
Attribution
delegation
Least Privilege
author_facet Coimbatore S. Chandersekaran
William R. Simpson
author_sort Coimbatore S. Chandersekaran
title Using SAML for Attribution, Delegation and Least Privilege
title_short Using SAML for Attribution, Delegation and Least Privilege
title_full Using SAML for Attribution, Delegation and Least Privilege
title_fullStr Using SAML for Attribution, Delegation and Least Privilege
title_full_unstemmed Using SAML for Attribution, Delegation and Least Privilege
title_sort using saml for attribution, delegation and least privilege
publisher International Institute of Informatics and Cybernetics
series Journal of Systemics, Cybernetics and Informatics
issn 1690-4524
publishDate 2011-02-01
description Delegation, Attribution and Least Privilege are an implicit part of information sharing. In operating systems like Windows there is no security enforcement for code running in kernel mode and therefore such code always runs with maximum privileges. The principle of least privilege therefore demands the use of a user mode solutions when given the choice between a kernel mode and user mode solution if the two solutions provide the same results. Discussions in this paper will be restricted to OSI model levels five and above. This paper describes the SAML delegation framework in the context of a large enclave-based architecture currently being implemented by the US Air Force. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
topic Information Sharing
Enterprise
Information Security
Attribution
delegation
Least Privilege
url http://www.iiisci.org/Journal/CV$/sci/pdfs/NK193KX.pdf
work_keys_str_mv AT coimbatoreschandersekaran usingsamlforattributiondelegationandleastprivilege
AT williamrsimpson usingsamlforattributiondelegationandleastprivilege
_version_ 1725706125466140672