• Home

EnThinnai Blog

Feed on
Posts
Comments

Flexible, but Secure Access Control in Cloud Storage

Nov 14th, 2010 by Aswath

There is a report that EU will be funding a research effort into Cloud Storage Technologies to the tune of $21.4 M. This project will be spearheaded by IBM’s research team in Haifa and it will take three years for the projet to complete.

The following paragraph in that story is my focus today: “The project will explore other advanced features for cloud storage, such as flexible but secure access control. For example, a company may want to distribute a video to participants of a conference, but they may not want to give access credentials to those people for its own network. The project will look into ways the video can be shared securely under those conditions while also being accessible by people through any device, Kolodner said.”

One of the upcoming features of EnThinnai is applicable for the described scenario. As was noted in a previous post, Notes in EnThinnai will have three parameters will be used to control access. The first is the standard “To” parameter identifying specific people that are allowed to access the content. This parameter will contain a list of OpenIDs of the individuals. The second parameter is “responsibility tag”. This will identify the authority resposible for issueing “responsibility”. The third parameter is “interest” tag where individuals declare their interest in material associted with a keyword.

The idea is when a company wants to distribute video to participants of a conference, they will create a “Note” and identify the conference organizer as the issuing authority and the name of the conference as the associated tag. When somebody tries to access this Note, the system will use OpenID procedure to authenticate the visitor and then use OpenID Attribute Exchange to query the conference organizer to confirm the visitor’s participation in the conference. Once this done, the system will allow access to the Note. Use of user-centri id like OpenID ensures that access is flexible and at the same time using an issuing authority to control acccess makes it secure.

Posted in Uncategorized | No Comments

Comments are closed.

  • Recent Posts

    • Defining ID, Authenticators and Approaches to Federation for WebRTC-based Systems
    • Rethinking Federation, ID, Namespace and Directories
    • Analyzing Zoom’s Popularity
    • EnThinnai and Lawyers
    • EnThinnai and Tutoring
  • Recent Comments

    • Kalyana Sundaram on 3 Ws of W(ebRTC)
    • Aswath on WebRTC App is Like a Formal Living Room
    • Carl Ford on WebRTC App is Like a Formal Living Room
    • Aswath on Tu Me doesn’t have to just To Go
    • Ramsundar Kandasamy on Tu Me doesn’t have to just To Go
  • Archives

    • July 2020
    • June 2020
    • April 2020
    • January 2020
    • October 2019
    • September 2019
    • May 2015
    • April 2015
    • September 2014
    • February 2014
    • January 2014
    • November 2013
    • September 2013
    • August 2013
    • July 2013
    • June 2013
    • November 2012
    • November 2011
    • August 2011
    • June 2011
    • April 2011
    • November 2010
    • August 2010
    • July 2010
    • May 2010
    • February 2010
    • March 2009
    • April 2008
    • March 2008
    • January 2008
    • December 2007
    • November 2007
    • October 2007
    • August 2007
  • Links

  • Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

EnThinnai Blog © 2023 All Rights Reserved.


read more today usa gambling games for money online casino real slot machine games online casino payment options online casinos that accept mastercard deposits from us online roulette for USA players first time deposit bonus casino online online slots for mac download casino casinos Classic casino games they offer online casinos that accept usa players bonus code for us casinos online blackjack real money newest casino 2013

united state https://www.euro-online.org online