Requirements for Scalable Access Control and Security Management Architectures
Postprint version. Published in ACM Transactions on Internet Technology, Volume 7, Issue 2, May 2007, pages 1-22.
Publisher URL: http://doi.acm.org/10.1145/1239971.1239972
Maximizing local autonomy by delegating functionality to end nodes when possible (the "end to end" design principle) has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access-control policies and mechanisms. Yet management of security is becoming an increasingly challenging problem, in no small part due to scaling up of measures such as number of users, protocols, applications, network elements, topological constraints, and functionality expectations.
In this paper we discuss scalability challenges for traditional access control mechanisms at the architectural level, and present a set of fundamental requirements for authorization services in large-scale networks. We show why existing mechanisms fail to meet these requirements, and investigate the current design options for a scalable access control architecture.
We argue that the key design options to achieve scalability are the choice of the representation of access control policy, the distribution mechanism for policy and the choice of access-rights revocation scheme. Although these ideas have been considered in the past, current access-control systems in use continue to use simpler but restrictive architectural models. With this paper, we hope to influence the design of future access-control systems towards more decentralized and scalable mechanisms.
Angelos D. Keromytis and Jonathan M. Smith. "Requirements for Scalable Access Control and Security Management Architectures" Departmental Papers (CIS) (2007).
Available at: http://works.bepress.com/jms/5