Authentication and authorization infrastructures (AAIs): a comparative survey

Javier Lopez, Rolf Oppliger, Günther Pernul
2004 Computers & security  
In this article, we argue that traditional approaches for authorization and access control in computer systems (i.e., discretionary, mandatory, and rolebased access controls) are not appropriate to address the requirements of networked or distributed systems, and that proper authorization and access control requires infrastructural support in one way or another. This support can be provided, for example, by an authentication and authorization infrastructure (AAI). Against this background, we
more » ... rview, analyze, discuss, and put into perspective some technologies that can be used to build and operate AAIs. More specifically, we address Microsoft .NET Passport and some related activities (e.g. the Liberty Alliance Project), Kerberos-based solutions, and AAIs that are based on digital certificates and public key infrastructures (PKIs). We conclude with the observation that there is no single best approach for providing an AAI, that every approach has specific advantages and disadvantages, and that a comprehensive AAI must combine various technologies and approaches. ª
doi:10.1016/j.cose.2004.06.013 fatcat:q3unwntl3jef7gpst7yij63qce