D-FOAF: Distributed Identity Management with Access Rights Delegation

Todays WWW consists of more than just information The WWW provides a large number of services, which often require identification of it's users This has lead to the fact that today users have to maintain a large number of different credentials for different websites – distributed or shared identification system are not widely deployed Furthermore current authorisation systems requires strict centralisation of the authorisation procedure – users themselves are usually not enabled to authorise their trusted friends to access services, although often this would be beneficial for services and businesses on the Web. In this article we present D-FOAF, a distributed identity management system which deploys social networks We show how information inherent in social networks can be utilised to provide community driven access rights delegation and we analyse algorithms for managing distributed identity, authorisation and access rights checking Finally we show how the social networking information can be protected in a distributed environment.

[1]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[2]  Ing. Daniel Cvrček Authorization Model for Strongly Distributed Information Systems , 2000 .

[3]  Wolfgang Nejdl,et al.  Ontology-Based Search and Broadcast in HyperCuP , 2002 .

[4]  Simon S. Lam,et al.  A framework for distributed authorization , 1993, Conference on Computer and Communications Security.

[5]  Stefan Decker,et al.  JeromeDL - Adding Semantic Web Technologies to Digital Libraries , 2005, DEXA.

[6]  Sebastian Ryszard Kruk,et al.  D-FOAF - Security Aspects in Distributed User Management System , 2005 .

[7]  Mark Newman,et al.  Models of the Small World , 2000 .

[8]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[9]  Trevor Jim,et al.  SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[10]  Prasun Dewan,et al.  Access control for collaborative environments , 1992, CSCW '92.

[11]  M E J Newman,et al.  Identity and Search in Social Networks , 2002, Science.

[12]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[13]  Srilekha Mudumbai,et al.  Certificate-based authorization policy in a PKI environment , 2003, TSEC.

[14]  John Skvoretz,et al.  Complexity theory and models for social networks , 2002 .

[15]  M. Newman Models of the Small World: A Review , 2000, cond-mat/0001118.

[16]  Gábor Csányi,et al.  Structure of a large social network. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  Steven Tuecke,et al.  An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[18]  Jon M. Kleinberg,et al.  Small-World Phenomena and the Dynamics of Information , 2001, NIPS.

[19]  Stefan Decker,et al.  Semantic Social Collaborative Filtering with FOAFRealm , 2005, Semantic Desktop Workshop.

[20]  Danah Boyd,et al.  Friendster and publicly articulated social networking , 2004, CHI EA '04.

[21]  William Henry Jones Project Integration Architecture: Distributed Lock Management, Deadlock Detection, and Set Iteration , 2005 .